Reports in .MD format
☆21Jul 8, 2025Updated 8 months ago
Alternatives and similar repositories for MalwareAnalysisReports
Users that are interested in MalwareAnalysisReports are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows API Hashes used in the malwares☆42Aug 7, 2015Updated 10 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- Repository with simples C binary samples for beginners REs & Defenders☆10May 29, 2024Updated last year
- ☆61Mar 15, 2026Updated last week
- A repository to store community malware research notes and findings.☆15Feb 13, 2026Updated last month
- Our Graduation project for FCIS mansoura university - CS depart☆14Nov 27, 2022Updated 3 years ago
- MODBUS Penetration Testing Framework☆12Jul 2, 2017Updated 8 years ago
- An IDA plugin to deobfuscate Pikabot's strings using RC4 and AES☆13Apr 8, 2024Updated last year
- Gets currently logged-on users on domain computers, to see if they are local admins or not.☆10Aug 14, 2019Updated 6 years ago
- ☆21Apr 19, 2024Updated last year
- Extract the original ransomware binary from an NSIS installer☆18Mar 22, 2017Updated 9 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- Writeups for the challenges i wrote for ASCWG quals☆10Aug 8, 2022Updated 3 years ago
- Code snippets for Qiling Tutorials☆21Aug 22, 2020Updated 5 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Oct 29, 2021Updated 4 years ago
- Index of my personal projects and writing, functionally a CV☆21Mar 11, 2026Updated last week
- Collection of Study Material for SANS - FOR610☆18Jul 31, 2020Updated 5 years ago
- Intro To CTF In Arabic☆17Aug 3, 2020Updated 5 years ago
- ☆22Mar 14, 2024Updated 2 years ago
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- DRILL (Distributable Remote Integrated Lightweight Link) is a powerful and stealthy Command and Control (C2) framework designed for seaml…☆34Jul 31, 2025Updated 7 months ago
- IDA Type Info Libraries for RE☆32Jan 11, 2025Updated last year
- ☆10Oct 11, 2020Updated 5 years ago
- The legend of random website☆21Mar 18, 2025Updated last year
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆39Jan 23, 2024Updated 2 years ago
- An IDA plugin that uses language models to speed up binary analysis.☆45Nov 23, 2025Updated 4 months ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆21Jul 11, 2021Updated 4 years ago
- ☆27Jul 18, 2024Updated last year
- ☆10Sep 28, 2022Updated 3 years ago
- MITRE ATT&CK visualizations☆12Jan 28, 2022Updated 4 years ago
- Windows sandbox PoC☆32May 25, 2020Updated 5 years ago
- Các IDA Flirt signatures HTC tạo☆20Oct 21, 2024Updated last year
- ☆13Feb 5, 2022Updated 4 years ago
- This program will connect multiple masters (SCADA master stations) to single slave (RTU) as defined protocol IEC 60870-5-104. Although th…☆15Dec 19, 2021Updated 4 years ago
- An IDA Pro plugin that simulate time-travel debugging by emulating code execution with Unicorn.☆39Jul 30, 2025Updated 7 months ago
- Example files to experience basic exploit techniques.☆75Apr 29, 2019Updated 6 years ago
- ☆20Jan 24, 2022Updated 4 years ago
- Files related to video tutorials from my YouTube channel!☆12Mar 12, 2019Updated 7 years ago
- Injector with kernel power☆18Jan 2, 2021Updated 5 years ago