buffer / maltracer
Win32 Python code for tracing malware activities on infected hosts
☆26Updated 8 years ago
Alternatives and similar repositories for maltracer:
Users that are interested in maltracer are comparing it to the libraries listed below
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- A collection of tools mostly written in Python.☆15Updated 10 years ago
- ☆16Updated 10 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Updated 9 years ago
- Yara Plugin for Binary Ninja☆13Updated 7 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49Updated 7 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- Format string exploit generation☆10Updated 9 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 9 years ago
- Tools to work with vulnerability standards.☆19Updated 11 years ago
- Tools☆13Updated 2 years ago
- A tool to download malwares☆16Updated last year
- A tool to generate yara signatures from function blocks☆19Updated 10 years ago
- Various Malware-Related Utilities☆10Updated 8 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆9Updated 9 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆13Updated 7 years ago
- Tools to enumerate Windows Firewall Hook Drivers on Windows 2000, XP and 2003☆20Updated 10 years ago
- yara rules for crypto detection☆30Updated 10 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Updated 8 years ago