buffer / maltracer
Win32 Python code for tracing malware activities on infected hosts
☆26Updated 8 years ago
Alternatives and similar repositories for maltracer:
Users that are interested in maltracer are comparing it to the libraries listed below
- ☆16Updated 10 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Various Malware-Related Utilities☆10Updated 8 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- A tool to generate yara signatures from function blocks☆19Updated 10 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- ☆17Updated 7 years ago
- Format string exploit generation☆10Updated 9 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆10Updated 9 years ago
- Tools☆13Updated last year
- yara rules for crypto detection☆30Updated 10 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Updated 8 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- A collection of tools mostly written in Python.☆15Updated 10 years ago
- Why hunt when you can seine?☆21Updated 9 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Tools to enumerate Windows Firewall Hook Drivers on Windows 2000, XP and 2003☆20Updated 10 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Updated 8 years ago
- A Volatility plugin for finding sqlite database rows☆22Updated 5 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 9 years ago