blackthorne / Codetective
a tool to determine the crypto/encoding algorithm used according to traces from its representation
☆132Updated 3 years ago
Alternatives and similar repositories for Codetective
Users that are interested in Codetective are comparing it to the libraries listed below
Sorting:
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- Detect silent (unwanted) changes to files on your system☆160Updated 5 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Updated 4 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆171Updated 6 years ago
- Collection of metasploit modules☆67Updated 8 years ago
- ☆92Updated 6 years ago
- ☆102Updated 5 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆142Updated 5 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 7 years ago
- ☆113Updated 8 years ago
- Simple shellcode decoder using unicorn-engine☆98Updated 9 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- PLASMA PULSAR☆69Updated 7 years ago
- URLCrazy☆31Updated 12 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Cryptowall Tooling & Information☆35Updated 9 years ago
- EditBox is a plugin for the Volatility Framework. It extracts the text from Windows Edit controls, that is, textboxes as generated by Win…☆24Updated 7 years ago
- File transfer via DNS☆73Updated 7 years ago
- HTTP Header Analysis Vulnerability Tool☆114Updated 4 years ago
- a grep -r for secrets☆178Updated 3 years ago
- A DNS connectback shell executed by strings in payloads.txt☆105Updated last year
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆85Updated 7 years ago
- A shellcode testing harness.☆69Updated 10 months ago
- Your bag of handy codes for malware researchers☆121Updated 5 years ago
- Detect sandbox by cursor movement speed☆52Updated 2 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 5 years ago
- Vulnerable Web applications Generator☆84Updated 7 years ago
- POLAR☆73Updated 6 years ago