De-obfuscate and reverse engineer PHP malware
☆83Oct 24, 2020Updated 5 years ago
Alternatives and similar repositories for reverse-php-malware
Users that are interested in reverse-php-malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- A Shadow Daemon connector for PHP applications☆33Nov 26, 2022Updated 3 years ago
- Decoding a User Space Encoded PHP Script☆106Jun 3, 2024Updated last year
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Javascript library fuzzer. Tries to detect functions which may lead to XSS vulnerabilities if untrusted data is passed to said functions.☆16Oct 6, 2020Updated 5 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Nov 11, 2016Updated 9 years ago
- Detect malicious domain, Blablablablabla☆27Jan 8, 2017Updated 9 years ago
- Bash script to retrieve unobfuscated (unencrypted) PHP code☆26Jun 18, 2013Updated 12 years ago
- Volatility plugin to help identify DoublePulsar implant by listing the array of pointers SrvTransaction2DispatchTable from the srv.sys dr…☆16Aug 14, 2017Updated 8 years ago
- please don't use it!☆13Nov 13, 2019Updated 6 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- A PHP extension for hooking eval()☆76Oct 13, 2023Updated 2 years ago
- Share the useful information, documentation and tips of Virbox Protector☆13Mar 17, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- Framework complet d'analyse de malware☆12Feb 22, 2016Updated 10 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆16Oct 10, 2016Updated 9 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆37Dec 7, 2025Updated 5 months ago
- Ioncube 8 decoder. Discontinued.☆114Jan 2, 2017Updated 9 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- Malware analysis tool☆22Apr 27, 2025Updated last year
- A Python-based programmable static tracing disassembler☆14Apr 7, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- Simple opcode dumper for php☆13Dec 18, 2015Updated 10 years ago
- Schema (SQL) and Data (JS) Migrations for node.js (for PostgreSQL and MySQL)☆29Sep 12, 2014Updated 11 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Jun 6, 2017Updated 8 years ago
- AYY LMAO☆12Aug 27, 2015Updated 10 years ago
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- Standalone CIRCLean/KittenGroomer code to sanitize emails.☆11Aug 9, 2018Updated 7 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- Malware Repository - Malware Samples of my Works☆42Oct 13, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Scanner for Regin Virtual Filesystems☆25Jan 20, 2015Updated 11 years ago
- Bash script to Check for malicious Cryptomining☆38Aug 19, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- MISP Workbench☆28Oct 19, 2016Updated 9 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27May 14, 2016Updated 9 years ago
- The Shadow Daemon web application firewall server☆305Nov 26, 2022Updated 3 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago