Identifying and Disrupting Crypto-Ransomware (and Destructive Malware) using handle heurustics
☆56Apr 3, 2015Updated 10 years ago
Alternatives and similar repositories for handle_monitor
Users that are interested in handle_monitor are comparing it to the libraries listed below
Sorting:
- Reverse shell and rootkit☆19Apr 28, 2017Updated 8 years ago
- Implementation of Kuznechik cipher Russian standard GOST R 3412-2015 - 128 bit block size / 256 bit key - 8,16, 32, 64, 128-bit x86 versi…☆10Jun 27, 2016Updated 9 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Shellcode injection using debugging APIs☆19Jan 13, 2014Updated 12 years ago
- Ultra fast, compact, Embedded Database for tabular and semistructured data.☆35Dec 13, 2021Updated 4 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Mar 1, 2016Updated 10 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Oct 25, 2015Updated 10 years ago
- One of the fastest binary format for JSON-like data.☆12Dec 13, 2021Updated 4 years ago
- Writeups for PicoCTF2017 Challenges☆10Apr 16, 2017Updated 8 years ago
- windows api hooking (user mode) sample☆21Jul 24, 2014Updated 11 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 11 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- Example plugin for x64dbg.☆24Jul 18, 2016Updated 9 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- A library for efficient interception of established TCP connections☆20Oct 12, 2015Updated 10 years ago
- Fast line iteration library written in Rust☆14May 28, 2017Updated 8 years ago
- DLL to use the power of Pafish☆32Oct 5, 2021Updated 4 years ago
- Framework complet d'analyse de malware☆12Feb 22, 2016Updated 10 years ago
- ELF Infector's Toolkit☆64May 26, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/malware-lu☆57May 21, 2019Updated 6 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- ☆20Mar 3, 2016Updated 10 years ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆24Nov 9, 2023Updated 2 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- Green shellcode challenge tools☆22Apr 9, 2019Updated 6 years ago
- ViDi Visual Disassembler (experimental)☆79Oct 8, 2025Updated 5 months ago
- Malware Behavior Analyzer☆158Jun 1, 2017Updated 8 years ago
- Redress Dissassembler is a cross platform binary disassembler written in Java with Capstone bindings☆24Mar 22, 2016Updated 10 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Aug 12, 2015Updated 10 years ago
- Moved to https://codeberg.org/DNS-OARC/bad-packets☆19Feb 4, 2026Updated last month
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- A drop-in replacement for the Rust standard library TCP listener with TLSv1.2 enabled.☆18Aug 18, 2016Updated 9 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Malware monitor template based on MinHook☆17Mar 29, 2015Updated 10 years ago