☆43Nov 5, 2018Updated 7 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below
Sorting:
- Miscellanous scripts used for malware analysis☆23Oct 4, 2018Updated 7 years ago
- ☆45Aug 16, 2018Updated 7 years ago
- Simple decrypter for Java AdWind, jRAT, jBifrost trojan☆17Jan 17, 2017Updated 9 years ago
- ☆43Aug 30, 2018Updated 7 years ago
- 进程内优雅地拦截SPI/LSP模块。 Manage SPI/LSP in a graceful way within private process.☆11Dec 28, 2017Updated 8 years ago
- CVE-2018-15982_EXP_IE☆12Dec 12, 2018Updated 7 years ago
- Decentralized open source slot game based on Ethereum blockchain☆14Dec 30, 2017Updated 8 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- ☆17Feb 15, 2022Updated 4 years ago
- Scripts to aid analysis of files obfuscated with ScatterBee.☆24Jan 6, 2023Updated 3 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Small random scripts for various things I find myself needing to repeat/automate☆24Apr 6, 2021Updated 4 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆54May 11, 2021Updated 4 years ago
- A VBA p-code disassembler☆485Jun 12, 2021Updated 4 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- A project that aims to automatically devirtualize code that has been virtualized using x86virt☆127Dec 3, 2022Updated 3 years ago
- ☆100Aug 28, 2018Updated 7 years ago
- ☆17Oct 25, 2018Updated 7 years ago
- Aurora Remote Administration Tool☆20Apr 16, 2018Updated 7 years ago
- ☆18Dec 4, 2018Updated 7 years ago
- String obfuscation in GO☆14Sep 19, 2019Updated 6 years ago
- POC for CVE-2018-4327☆42Sep 13, 2018Updated 7 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆120Apr 30, 2019Updated 6 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Feb 15, 2022Updated 4 years ago
- Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing compiler artifacts, binaries…☆28Apr 23, 2021Updated 4 years ago
- 使用VS2017编译Nginx,方便调测☆16Mar 4, 2018Updated 8 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- IDA python plugin to scan binary with Yara rules☆181Jan 30, 2024Updated 2 years ago
- Quick and simple way to encrypt your code via OpenSSL with a key size of 16, 24 or 32 to protect your code from being seen☆16Jan 19, 2020Updated 6 years ago
- an RCE (remote command execution) approach of CVE-2018-7750☆21Nov 6, 2018Updated 7 years ago
- POC for CVE-2018-0824☆88Oct 18, 2022Updated 3 years ago
- A simple C# executable that invokes an arbitrary method of an arbitrary C# DLL☆139Mar 24, 2024Updated last year
- ☆17Jul 26, 2018Updated 7 years ago
- Autoinstall T-Pot on Ubuntu 16.04☆28Aug 1, 2018Updated 7 years ago
- Simple 32/64-bit PEs loader.☆139Dec 19, 2018Updated 7 years ago
- WebLogic Exploit☆143Jul 13, 2018Updated 7 years ago