demon-i386 / malware-analysis
Open malware analysis / reversing database
☆12Updated 3 years ago
Alternatives and similar repositories for malware-analysis:
Users that are interested in malware-analysis are comparing it to the libraries listed below
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15Updated 2 years ago
- Conteúdo do treinamento/brainstorming Introdução a engenharia reversa no Windows feito com muito carinho por mim.☆14Updated 2 years ago
- Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)☆8Updated 3 years ago
- 「💽」MBR Overwrite malware for linux☆26Updated 4 months ago
- Misery Loader to bypass modern EDR solutions☆10Updated 4 months ago
- ☆10Updated 6 years ago
- Tool to start a python http server in a simple way☆10Updated 3 years ago
- a cpp wrapper for ngrok☆9Updated 4 years ago
- Multiplatform CLI and GUI tool to show information about ELF files☆54Updated last year
- CLI program to calculate the entropy of files☆70Updated last year
- General malware analysis stuff☆36Updated 7 months ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Updated 3 years ago
- Breaking Active Directory Security with 🍞☆32Updated 5 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆60Updated 3 years ago
- 「💻」Simple kernel made in 16-bit assembly only☆16Updated 4 months ago
- A simple multiplatform command line search tool for Windows API.☆47Updated last month
- DNS over HTTPS targeted malware (only runs once)☆96Updated last year
- This extension is meticulously crafted to safeguard users from phishing attempts that replicate the Office365 login interface, particular…☆11Updated last year
- Quickly find all identities someone has used on their Github commits☆16Updated 8 months ago
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆40Updated 4 months ago
- a simple assembly bootloader using nasm and Intel syntax☆10Updated 3 years ago
- Robson is a simple LKM rootkit that uses the Linux kernel's kprobes tracing feature as a hooking mechanism.☆12Updated 2 years ago
- Polymorphic ELF Virus☆16Updated 3 years ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- Manipulating tokens for SeImpersonatePrivilege exploitation using Windows API☆9Updated last year
- This is a simple process injection made in C for Linux systems☆26Updated last year
- A simple C program to demonstrate a Buffer Overflow.☆11Updated 3 years ago
- Research developed by Allele Security Intelligence.☆10Updated 3 weeks ago
- ☆39Updated last month
- ☆12Updated 4 years ago