Deobfuscation and analysis of PHP malware captured by a WordPress honey pot
☆142Jun 18, 2021Updated 4 years ago
Alternatives and similar repositories for php-malware-analysis
Users that are interested in php-malware-analysis are comparing it to the libraries listed below
Sorting:
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- ☆19Jul 29, 2022Updated 3 years ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- Polymorphic ELF Virus☆18Mar 19, 2022Updated 3 years ago
- AYY LMAO☆22Mar 26, 2016Updated 9 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Experimental CPU-bound (soon GPU) vanity onion address generator. Moved to https://gitlab.com/dphillips/sand-leek☆11Sep 5, 2020Updated 5 years ago
- A mysql honeypot, still very very early stage☆22Oct 14, 2012Updated 13 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- Go package to parse Bitcoin Core's mempool.dat file☆10Jun 16, 2019Updated 6 years ago
- Easy cross platform encryption and decryption☆26Nov 24, 2014Updated 11 years ago
- This is a collection of known malware and threats found on various Linux/web servers. Also find known ways to detect☆12Aug 1, 2020Updated 5 years ago
- PHP obfuscator written in Javascript.☆14Oct 8, 2021Updated 4 years ago
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- Custom rules for yara-integrated scans☆16Jun 5, 2013Updated 12 years ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated 10 months ago
- Redbeards Messenger is a lightweight secure instant messaging platform designed to put you in control of your data.☆13Mar 19, 2017Updated 8 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Simple hosting and data sharing on Tor network☆11Nov 30, 2016Updated 9 years ago
- shapeshift.io api for node.js☆11Jun 29, 2016Updated 9 years ago
- Helps you frequently update your Tor bridges list.☆11Oct 30, 2017Updated 8 years ago
- Create vanity contract addresses for ethereum☆12Feb 24, 2017Updated 9 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- ☆16Dec 7, 2025Updated 2 months ago
- 一些漏洞的环境/利用工具/分析☆10Jul 24, 2020Updated 5 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Jul 26, 2020Updated 5 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- Newsd is a standalone local NNTP news server for private newsgroup serving on a single server.☆18Jan 25, 2026Updated last month
- A free implementation to convert an NFO to PNG. Made in PHP language using GD image manipulation techniques. Compatible with PHP 5.2 and …☆10Feb 23, 2019Updated 7 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- A portal into bitcoin wonderland☆16Oct 29, 2018Updated 7 years ago
- Exploit for the vulnerability null pointer derefrence to in XWorm RAT☆19Mar 31, 2025Updated 11 months ago
- A tool for backing up remote MySQL databases☆17Jun 27, 2017Updated 8 years ago
- A web-app for tracking your workouts, accompanied with statistics and other functions to make your gym-sessions as interesting and easy a…☆13Jul 19, 2022Updated 3 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- This is a frontend for the STIX™ (2.0) language.☆17Dec 20, 2018Updated 7 years ago
- A curated repository of the tools, scripts, resources and programs I use regularly for CTF, BB or other security work.☆15Aug 4, 2021Updated 4 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆94Feb 4, 2023Updated 3 years ago