A repo for UVa's CS 4630, Defense Against the Dark Arts course
☆18Dec 5, 2017Updated 8 years ago
Alternatives and similar repositories for dada
Users that are interested in dada are comparing it to the libraries listed below
Sorting:
- Yet Another Memory Analyzer for malware detection☆24Aug 4, 2023Updated 2 years ago
- ☆38Jun 5, 2023Updated 2 years ago
- ☆11Nov 17, 2025Updated 4 months ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 9 months ago
- ☆13Oct 14, 2016Updated 9 years ago
- ☆37Nov 27, 2025Updated 3 months ago
- 基于Kubernetes v1.22.2集群部署ELK日志分析系统。并收集与展示Nginx的access访问日志。☆12Jan 26, 2022Updated 4 years ago
- Elasticsearch Stack Overflow Vulnerability☆18Sep 23, 2023Updated 2 years ago
- Windows Defender Manager is a tool that helps stop Windows Defender. It works with the Antimalware Service Executable of all versions of …☆41Jan 18, 2025Updated last year
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago
- ☆15Nov 19, 2023Updated 2 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Dec 30, 2023Updated 2 years ago
- 基于Go和YARA规则 对windows进程和文件进行检测☆18Sep 20, 2024Updated last year
- AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.☆57Updated this week
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆26Dec 13, 2022Updated 3 years ago
- Exploit for HEVD☆10Sep 11, 2019Updated 6 years ago
- 📗 Documents of Linux ELF binary signature verification solution.☆11Nov 30, 2020Updated 5 years ago
- A cross-platform, collaborative C2 for red-teaming. Agents are cross-compilable (e.g, you can generate Windows DLLs on Linux), cross-comp…☆24Mar 7, 2025Updated last year
- ☆10Mar 5, 2016Updated 10 years ago
- ☆12Jun 27, 2019Updated 6 years ago
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆16Sep 7, 2023Updated 2 years ago
- Using Windows Hook to make a CLI WebShellKill☆45Feb 4, 2019Updated 7 years ago
- xred蠕虫病毒修复工具☆20Dec 2, 2021Updated 4 years ago
- a bunch of malware in all platform, some maybe not work, this code for some study case or for knowledge. for information about malware yo…☆14Jan 29, 2021Updated 5 years ago
- ☆15Aug 22, 2022Updated 3 years ago
- A c0 -> LLVM IR compiler, with some optimization.☆13Jul 13, 2020Updated 5 years ago
- Malware that TeamTNT found and removed.☆14Nov 27, 2020Updated 5 years ago
- Scripting together some of my favorite Python tools for doing initial triage of a suspected malicious document (e.g. PDF, DOC, DOCX, XSLM…☆17Mar 8, 2022Updated 4 years ago
- A parser of Windows Defender's DetectionHistory forensic artifact, containing substantial info about quarantined files and executables.☆117Jan 26, 2022Updated 4 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆24Jun 22, 2018Updated 7 years ago
- Offline AI Security Assistant for Air-Gapped Pentesting☆73Feb 22, 2026Updated last month
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65May 1, 2023Updated 2 years ago
- Manage attack surface data on Elasticsearch☆25Nov 20, 2023Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- 获取系统KB补丁对于的MS号☆24Aug 18, 2019Updated 6 years ago
- Collection of scripts to automate the Malware Analysis process☆33Oct 27, 2025Updated 4 months ago
- List of some cybersecurity conferences☆59Feb 8, 2026Updated last month
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 4 years ago
- ☆70Oct 30, 2023Updated 2 years ago