This repository has everything I have learnt so far while reading the book Practical Malware Analysis
☆35Nov 4, 2019Updated 6 years ago
Alternatives and similar repositories for Practical-Malware-Analysis
Users that are interested in Practical-Malware-Analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is the source of our Return Oriented Programming tool.☆14Nov 8, 2019Updated 6 years ago
- Simple virtual machine for teaching basic concepts of virtual machine implementation.☆29Oct 29, 2019Updated 6 years ago
- Network monitor for Linux☆13Aug 11, 2019Updated 6 years ago
- x64dbg scripts for finding OEP of packers☆16Oct 22, 2018Updated 7 years ago
- Kernel mode windows NT API logger☆22Sep 9, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 一些研究☆14Dec 18, 2019Updated 6 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆38Oct 23, 2018Updated 7 years ago
- My solutions for pwn and reversing challenges☆11Mar 18, 2018Updated 8 years ago
- Linux rootkit for kernel 4.9.133☆16Jan 6, 2019Updated 7 years ago
- ☆26Nov 20, 2019Updated 6 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- (Inverse Path | F-Secure) Hardware Security Team - Security Advisories☆24Dec 15, 2021Updated 4 years ago
- NextB的基于敏感哈希的恶意文件相似度比较工具(C发行版本)☆20Nov 20, 2019Updated 6 years ago
- ROPChain generator.☆40Sep 20, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆12Apr 26, 2026Updated last week
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- GeSWall, Intrusion Prevention System for Windows☆22Jan 18, 2026Updated 3 months ago
- Describe how to use ffuf different options with examples☆14Jun 13, 2022Updated 3 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- malloc for memory-mapped files☆14Jun 25, 2020Updated 5 years ago
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Sep 28, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Java bindings for Google cpu_features☆10Jun 20, 2024Updated last year
- ☆13Oct 10, 2018Updated 7 years ago
- Ghidra's development plugins, scripts, contributing. Presentation☆13Aug 10, 2020Updated 5 years ago
- ☆15Jan 20, 2016Updated 10 years ago
- ☆11Oct 17, 2024Updated last year
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- A simple tool for bulk adding/updating/removing tags from AWS resources.☆13Jan 8, 2016Updated 10 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆17Apr 1, 2026Updated last month
- iPod shuffle 3 bootrom exploit (Pwnage 2.0)☆15Nov 30, 2024Updated last year
- ☆14Jun 5, 2019Updated 6 years ago
- Progress of learning kernel development☆14Nov 20, 2022Updated 3 years ago
- A Python command line argument to object parsing library for command line application development☆15Mar 23, 2016Updated 10 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- Example plug-ins for GammaRay☆15Jun 4, 2018Updated 7 years ago