demon-i386 / malware-analysis
Open malware analysis / reversing database
☆12Updated 3 years ago
Alternatives and similar repositories for malware-analysis:
Users that are interested in malware-analysis are comparing it to the libraries listed below
- Conteúdo do treinamento/brainstorming Introdução a engenharia reversa no Windows feito com muito carinho por mim.☆14Updated 2 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆13Updated 2 years ago
- Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)☆8Updated 2 years ago
- 「💽」MBR Overwrite malware for linux☆26Updated last month
- BREaking Active Directory Security with 🍞☆11Updated 10 months ago
- a cpp wrapper for ngrok☆8Updated 3 years ago
- Multiplatform CLI and GUI tool to show information about ELF files☆50Updated last year
- 「💻」Simple kernel made in 16-bit assembly only☆15Updated last month
- 「🧊」Ring 3 Rootkit for Windows 10☆58Updated last month
- A simple C program to demonstrate a Buffer Overflow.☆11Updated 3 years ago
- Tool to start a python http server in a simple way☆10Updated 2 years ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆13Updated 5 months ago
- Collection of ezine about virii☆15Updated 2 years ago
- ☆10Updated 6 years ago
- This is a simple process injection made in C for Linux systems☆26Updated last year
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆19Updated 2 years ago
- Exploit development challenges!☆23Updated last year
- ☆33Updated 2 years ago
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆19Updated 10 months ago
- A simple multiplatform command line search tool for Windows API.☆44Updated last year
- 🔨 Linux Hash Cracker☆31Updated 6 months ago
- Stub for polymorphic code☆12Updated last year
- DNS over HTTPS targeted malware (only runs once)☆95Updated last year
- Bypass Malware Time Delays☆100Updated 2 years ago