ahma-hub / analysisLinks
The current repository contains all the scripts needed to reproduce the results published in the paper: "Obfuscation Revealed: Electromagnetic obfuscated malware classification".
☆75Updated 3 years ago
Alternatives and similar repositories for analysis
Users that are interested in analysis are comparing it to the libraries listed below
Sorting:
- ☆133Updated 3 years ago
- LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems (ACSAC 2021)☆67Updated 3 years ago
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆139Updated last year
- DDS workshops at DEFCON☆77Updated 11 months ago
- Clone network interface from one host as a tap interface on another host☆60Updated 4 years ago
- ADDVulcan satellite hacking solutions for for Hack-A-Sat 2020☆50Updated 4 years ago
- Awesome SDR Tools , Libs :)☆27Updated 5 years ago
- Public Issue tracker to gather feedback for and allow discussions around Malpedia☆34Updated 3 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆41Updated 4 years ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆87Updated last year
- Open source release of challenges and other code used in the 2020 Hack-a-Sat Final.☆83Updated 4 years ago
- Shodan is the world's first search engine for Internet-connected devices☆12Updated 4 months ago
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆78Updated 7 years ago
- I have created a lower cost approximation of the Toyota PASTA:Portable Automotive Testbed with Adaptability using consumer hardware and A…☆83Updated 2 years ago
- A Passive SSH back-end and scanner.☆102Updated last month
- A collection of learning resources for budding aviation security researchers☆93Updated 4 years ago
- Exploring various defensive response options for effectively securing a 5G core-network☆41Updated last year
- ☆19Updated 4 years ago
- A platform built for easy-to-use automated network traffic analysis☆59Updated 2 years ago
- A tool for characterizing the network behavior of IoT Devices. The primary intended use is to assist in the generation of allowlist files…☆24Updated last year
- This will be a wiki when it grows up, if it grows up☆93Updated last year
- ☆14Updated 7 years ago
- USB armory - hardware control tool☆32Updated 5 months ago
- code and manual for the defcon 29 electronic Tor badge☆23Updated 3 years ago
- Guidance for blocking outdated web technologies. #nsacyber☆60Updated 3 years ago
- A memorial site for Hackers and Infosec people who have passed☆136Updated 2 months ago
- Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.☆84Updated 2 years ago
- A command line utility to interact and query the Centrifuge API.☆17Updated last year
- Resources and demos from the DEFCON 30 Brief "Space Jam: Exploring Radio Frequency Attacks in Outer Space" by James Pavur☆19Updated 2 years ago
- ☆24Updated 3 months ago