demon-i386 / malware-analysis
Open malware analysis / reversing database
☆12Updated 3 years ago
Alternatives and similar repositories for malware-analysis:
Users that are interested in malware-analysis are comparing it to the libraries listed below
- Conteúdo do treinamento/brainstorming Introdução a engenharia reversa no Windows feito com muito carinho por mim.☆14Updated 2 years ago
- Multiplatform CLI and GUI tool to show information about ELF files☆53Updated last year
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15Updated 2 years ago
- Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)☆8Updated 3 years ago
- a cpp wrapper for ngrok☆8Updated 3 years ago
- ☆10Updated 6 years ago
- Misery Loader to bypass modern EDR solutions☆10Updated 3 months ago
- 「💽」MBR Overwrite malware for linux☆26Updated 3 months ago
- Stub for polymorphic code☆12Updated 2 years ago
- A simple multiplatform command line search tool for Windows API.☆45Updated 3 weeks ago
- Tool to start a python http server in a simple way☆10Updated 2 years ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆34Updated 8 months ago
- This is my malware database, but I AM NOT RESPONSIABLE FOR ANY DAMAGE + pan koza is a skid and ready to fork this $h!t.☆10Updated 10 months ago
- 🔨 Linux Hash Cracker☆32Updated 8 months ago
- A simple C program to demonstrate a Buffer Overflow.☆11Updated 3 years ago
- DNS over HTTPS targeted malware (only runs once)☆96Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆60Updated 3 years ago
- A curated malware database with more then +73000 samples.☆17Updated 4 years ago
- General malware analysis stuff☆36Updated 7 months ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆14Updated 7 months ago
- Conti Ransomware Source Code☆20Updated 3 years ago
- 「💻」Simple kernel made in 16-bit assembly only☆16Updated 3 months ago
- Malware and malicious applications database☆37Updated 9 months ago
- ☆37Updated 3 weeks ago
- AES-encrypted TCP/IP swiss army knife.☆9Updated 2 years ago
- Some ELF Malwares☆9Updated 3 years ago
- a simple assembly bootloader using nasm and Intel syntax☆10Updated 3 years ago
- ☆25Updated 4 months ago
- Bypass Malware Time Delays☆100Updated 2 years ago
- ☆32Updated last year