This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.
☆44Jul 23, 2024Updated last year
Alternatives and similar repositories for CnCHunter
Users that are interested in CnCHunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extracting AsyncRAT configuration using CyberChef☆14May 4, 2022Updated 3 years ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆17Sep 9, 2021Updated 4 years ago
- 分析cobaltstrike c2 协议☆68Feb 24, 2020Updated 6 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated last month
- A protocol reverse engineer tool written in java.☆30Oct 14, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- IP画像业务安全版私有化部署SDK☆13Dec 8, 2022Updated 3 years ago
- ☆21Dec 22, 2020Updated 5 years ago
- SWAT - System-Wide Analysis Toolkit☆16Oct 4, 2021Updated 4 years ago
- 从美国国家漏洞库NVD获取某个特定版本软件的漏洞统计信息。☆16Mar 29, 2022Updated 4 years ago
- ☆10Apr 13, 2022Updated 3 years ago
- ☆11Nov 14, 2024Updated last year
- List of (automatic) protocol reverse engineering tools for network protocols☆181May 22, 2024Updated last year
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Sep 15, 2019Updated 6 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- ☆37May 2, 2023Updated 2 years ago
- The malsource dataset☆12Aug 31, 2021Updated 4 years ago
- ☆13Mar 19, 2022Updated 4 years ago
- Protocol Inspection and State Machine Analysis☆23May 26, 2018Updated 7 years ago
- Malware detection by entropy - ascii entropy and binary entropy☆10Mar 19, 2017Updated 9 years ago
- Makeup store iOS app developed in Swift☆11Apr 28, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- ☆74Jul 23, 2021Updated 4 years ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- Evaluation of packer type estimation/detection tools☆14Mar 24, 2021Updated 5 years ago
- 沙箱测试,测评国内常见沙箱的代码与结论☆107Jul 3, 2021Updated 4 years ago
- ☆13Dec 22, 2021Updated 4 years ago
- ☆11Aug 7, 2021Updated 4 years ago
- Python API wrapper for the Joe Sandbox API.☆69Jan 19, 2026Updated 2 months ago
- ProcessHollowing via csharp☆13Dec 21, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- various methods of making API calls☆19Feb 1, 2025Updated last year
- no-defender re-up all credit goes to https://github.com/es3n1n/no-defender☆28Jun 10, 2024Updated last year
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13May 6, 2017Updated 8 years ago
- BLEDiff is an automated, scalable, property-agnostic, and black-box protocol noncompliance checker for BLE devices.☆13Mar 31, 2023Updated 2 years ago