Reports in .MD format
☆22Jul 8, 2025Updated 9 months ago
Alternatives and similar repositories for MalwareAnalysisReports
Users that are interested in MalwareAnalysisReports are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows API Hashes used in the malwares☆42Aug 7, 2015Updated 10 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- Repository with simples C binary samples for beginners REs & Defenders☆10May 29, 2024Updated last year
- ☆63Mar 15, 2026Updated last month
- A repository to store community malware research notes and findings.☆15Feb 13, 2026Updated 2 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆15Sep 30, 2025Updated 7 months ago
- MODBUS Penetration Testing Framework☆12Jul 2, 2017Updated 8 years ago
- Our Graduation project for FCIS mansoura university - CS depart☆14Nov 27, 2022Updated 3 years ago
- An IDA plugin to deobfuscate Pikabot's strings using RC4 and AES☆13Apr 8, 2024Updated 2 years ago
- Gets currently logged-on users on domain computers, to see if they are local admins or not.☆10Aug 14, 2019Updated 6 years ago
- ☆21Apr 19, 2024Updated 2 years ago
- Extract the original ransomware binary from an NSIS installer☆18Mar 22, 2017Updated 9 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- Writeups for the challenges i wrote for ASCWG quals☆10Aug 8, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Code snippets for Qiling Tutorials☆21Aug 22, 2020Updated 5 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Oct 29, 2021Updated 4 years ago
- Index of my personal projects and writing, functionally a CV☆22Mar 11, 2026Updated last month
- Intro To CTF In Arabic☆17Aug 3, 2020Updated 5 years ago
- ☆22Mar 14, 2024Updated 2 years ago
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- Collection of Study Material for SANS - FOR610☆21Jul 31, 2020Updated 5 years ago
- DRILL (Distributable Remote Integrated Lightweight Link) is a powerful and stealthy Command and Control (C2) framework designed for seaml…☆36Jul 31, 2025Updated 9 months ago
- ☆10Oct 11, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- IDA Type Info Libraries for RE☆32Jan 11, 2025Updated last year
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆39Jan 23, 2024Updated 2 years ago
- The legend of random website☆22Mar 18, 2025Updated last year
- agent.btz download MALWARE BINARY PROVIDED + POC video☆23Jul 11, 2021Updated 4 years ago
- ☆27Jul 18, 2024Updated last year
- ☆10Sep 28, 2022Updated 3 years ago
- MITRE ATT&CK visualizations☆12Jan 28, 2022Updated 4 years ago
- Windows sandbox PoC☆32May 25, 2020Updated 5 years ago
- An IDA plugin that uses language models to speed up binary analysis.☆48Nov 23, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Các IDA Flirt signatures HTC tạo☆20Oct 21, 2024Updated last year
- ☆13Feb 5, 2022Updated 4 years ago
- This program will connect multiple masters (SCADA master stations) to single slave (RTU) as defined protocol IEC 60870-5-104. Although th…☆16Dec 19, 2021Updated 4 years ago
- An IDA Pro plugin that simulate time-travel debugging by emulating code execution with Unicorn.☆40Jul 30, 2025Updated 9 months ago
- Example files to experience basic exploit techniques.☆74Apr 29, 2019Updated 7 years ago
- ☆20Jan 24, 2022Updated 4 years ago
- Files related to video tutorials from my YouTube channel!☆12Mar 12, 2019Updated 7 years ago