☆24Jul 6, 2018Updated 7 years ago
Alternatives and similar repositories for hijacked_lokibot_version
Users that are interested in hijacked_lokibot_version are comparing it to the libraries listed below
Sorting:
- Large Scale Cumulative Binary Diffing.☆25Mar 10, 2018Updated 7 years ago
- Win32k Elevation of Privilege Poc☆24May 17, 2019Updated 6 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Register-based VM as C library☆10Feb 13, 2016Updated 10 years ago
- Yara sort☆13Updated this week
- BlackHat Europe 2017 Slides☆25Feb 15, 2018Updated 8 years ago
- Analysis of VBS exploit CVE-2018-8174☆31Jul 12, 2018Updated 7 years ago
- Automatically generate ASM.JS JIT-Spray payloads☆36Mar 14, 2018Updated 7 years ago
- Malice Office/OLE/RTF Plugin☆13Aug 29, 2018Updated 7 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- Some writeups in ctf.☆11Mar 31, 2022Updated 3 years ago
- Notes about reverse engineering the Petya2017 ransomware☆20Jul 6, 2017Updated 8 years ago
- Simple decrypter for Java AdWind, jRAT, jBifrost trojan☆17Jan 17, 2017Updated 9 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Feb 17, 2015Updated 11 years ago
- An open source virus scan aggregation framework.☆25Apr 25, 2014Updated 11 years ago
- ld_preload userland rootkit☆35Dec 13, 2020Updated 5 years ago
- ☆13Sep 15, 2018Updated 7 years ago
- CVE-2017-7494 - Detection Scripts☆63May 26, 2017Updated 8 years ago
- POC for CVE-2018-15685☆42Aug 24, 2018Updated 7 years ago
- ☆21Jul 27, 2020Updated 5 years ago
- crash poc & Leak info PoC☆18Mar 19, 2018Updated 7 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- Proof of Concept example of Android Malware used for Research Purposes☆23Dec 22, 2016Updated 9 years ago
- ☆22Oct 13, 2017Updated 8 years ago
- OLE Package Format Documentation☆23Jun 13, 2020Updated 5 years ago
- This repo generally for malware Researcher ("Password: infected")☆19Feb 24, 2026Updated last week
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆17Nov 4, 2012Updated 13 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- Linux malware analysis based on Cuckoo Sandbox.☆41Apr 19, 2023Updated 2 years ago
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆84Jun 1, 2022Updated 3 years ago
- Malicious PDF document parsing tool☆16Nov 1, 2017Updated 8 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Jul 29, 2019Updated 6 years ago
- Offline debugger for malware's reverse engineering☆116Jan 21, 2015Updated 11 years ago
- A collection of my reverse engineering and malware analysis write-ups☆21Dec 11, 2020Updated 5 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- python ShellCode Loader (Cobaltstrike&Metasploit)☆20Nov 28, 2019Updated 6 years ago
- a modified version base on Tracecorn☆20Oct 29, 2019Updated 6 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆29Aug 17, 2023Updated 2 years ago