demon-i386 / malware-analysisLinks
Open malware analysis / reversing database
☆11Updated 4 years ago
Alternatives and similar repositories for malware-analysis
Users that are interested in malware-analysis are comparing it to the libraries listed below
Sorting:
- Stub for polymorphic code☆12Updated 2 years ago
- ☆10Updated 6 years ago
- 「💽」MBR Overwrite malware for linux☆26Updated 6 months ago
- ☆12Updated 4 years ago
- Multiplatform CLI and GUI tool to show information about ELF files☆58Updated last year
- Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)☆8Updated 3 years ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- 「🧊」Ring 3 Rootkit for Windows 10☆57Updated 6 months ago
- CLI program to calculate the entropy of files☆70Updated last year
- Misery Loader to bypass modern EDR solutions☆10Updated 6 months ago
- using the gpu to hide your payload☆59Updated 2 years ago
- a cpp wrapper for ngrok☆9Updated 4 years ago
- This is a simple process injection made in C for Linux systems☆26Updated last year
- Conteúdo do treinamento/brainstorming Introdução a engenharia reversa no Windows feito com muito carinho por mim.☆14Updated 2 years ago
- Collection of ezine about virii☆17Updated 2 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Updated 2 years ago
- General malware analysis stuff☆37Updated 10 months ago
- DNS over HTTPS targeted malware (only runs once)☆98Updated last year
- PE Injector - Inject code on 32-bit and 64-bit PE executables☆33Updated 3 years ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Updated 3 years ago
- Dump Microsoft Recall data and images☆12Updated last year
- ☆27Updated 7 months ago
- ☆33Updated 2 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15Updated 3 years ago
- Attacking the cleanup_module function of a kernel module☆36Updated 2 months ago
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆25Updated 2 months ago
- Proof of Concept example for abusing Process Hacker 2 (v2.39.124)☆22Updated 7 months ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆18Updated 2 years ago
- Offensive Assembly code snippets.☆12Updated last year
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆14Updated 4 years ago