☆43Nov 5, 2018Updated 7 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Miscellanous scripts used for malware analysis☆23Oct 4, 2018Updated 7 years ago
- ☆45Aug 16, 2018Updated 7 years ago
- Simple decrypter for Java AdWind, jRAT, jBifrost trojan☆17Jan 17, 2017Updated 9 years ago
- ☆43Aug 30, 2018Updated 7 years ago
- 进程内优雅地拦截SPI/LSP模块。 Manage SPI/LSP in a graceful way within private process.☆11Dec 28, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- ☆17Feb 15, 2022Updated 4 years ago
- Scripts to aid analysis of files obfuscated with ScatterBee.☆24Jan 6, 2023Updated 3 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆55May 11, 2021Updated 5 years ago
- Small random scripts for various things I find myself needing to repeat/automate☆25Apr 6, 2021Updated 5 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆100Aug 28, 2018Updated 7 years ago
- A project that aims to automatically devirtualize code that has been virtualized using x86virt☆128Dec 3, 2022Updated 3 years ago
- Aurora Remote Administration Tool☆20Apr 16, 2018Updated 8 years ago
- ☆18Dec 4, 2018Updated 7 years ago
- String obfuscation in GO☆14Sep 19, 2019Updated 6 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆121Apr 30, 2019Updated 7 years ago
- POC for CVE-2018-4327☆42Sep 13, 2018Updated 7 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Feb 15, 2022Updated 4 years ago
- Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing compiler artifacts, binaries…☆29Apr 23, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 使用VS2017编译Nginx,方便调测☆16Mar 4, 2018Updated 8 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 6 years ago
- IDA python plugin to scan binary with Yara rules☆181Jan 30, 2024Updated 2 years ago
- Quick and simple way to encrypt your code via OpenSSL with a key size of 16, 24 or 32 to protect your code from being seen☆15Jan 19, 2020Updated 6 years ago
- an RCE (remote command execution) approach of CVE-2018-7750☆21Nov 6, 2018Updated 7 years ago
- POC for CVE-2018-0824☆87Oct 18, 2022Updated 3 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- A simple C# executable that invokes an arbitrary method of an arbitrary C# DLL☆142Mar 24, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Autoinstall T-Pot on Ubuntu 16.04☆27Aug 1, 2018Updated 7 years ago
- WebLogic Exploit☆143Jul 13, 2018Updated 7 years ago
- Simple 32/64-bit PEs loader.☆140Dec 19, 2018Updated 7 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆93May 23, 2019Updated 6 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Jun 11, 2020Updated 5 years ago
- ActiveMime File Format Documentation☆19Jun 28, 2021Updated 4 years ago
- POC and exploitation of vulnerabilities☆90Mar 22, 2022Updated 4 years ago