demon-i386 / malware-analysis
Open malware analysis / reversing database
☆12Updated 3 years ago
Alternatives and similar repositories for malware-analysis
Users that are interested in malware-analysis are comparing it to the libraries listed below
Sorting:
- Multiplatform CLI and GUI tool to show information about ELF files☆56Updated last year
- Conteúdo do treinamento/brainstorming Introdução a engenharia reversa no Windows feito com muito carinho por mim.☆14Updated 2 years ago
- 「💽」MBR Overwrite malware for linux☆26Updated 5 months ago
- Malware and malicious applications database☆38Updated 11 months ago
- General malware analysis stuff☆37Updated 8 months ago
- 🍞 BREADS is a tool focused on enumerating and attacking Active Directory environments through LDAP, SMB, and other protocols. This proje…☆33Updated 5 months ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15Updated 2 years ago
- a cpp wrapper for ngrok☆9Updated 4 years ago
- ☆10Updated 6 years ago
- ☆33Updated 2 years ago
- Misery Loader to bypass modern EDR solutions☆10Updated 4 months ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- 「🧊」Ring 3 Rootkit for Windows 10☆57Updated 5 months ago
- This is a simple process injection made in C for Linux systems☆26Updated last year
- ☆12Updated 4 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆19Updated 2 years ago
- DNS over HTTPS targeted malware (only runs once)☆97Updated last year
- Exploit development challenges!☆24Updated 2 years ago
- A simple C program to demonstrate a Buffer Overflow.☆11Updated 3 years ago
- A simple multiplatform command line search tool for Windows API.☆46Updated 2 months ago
- Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)☆8Updated 3 years ago
- ☆10Updated 2 years ago
- Manipulating tokens for SeImpersonatePrivilege exploitation using Windows API☆8Updated last year
- Stub for polymorphic code☆12Updated 2 years ago
- 「💻」Simple kernel made in 16-bit assembly only☆16Updated 5 months ago
- Bypass Malware Time Delays☆101Updated 2 years ago
- Tool to start a python http server in a simple way☆10Updated 3 years ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆40Updated 9 months ago
- Quickly find all identities someone has used on their Github commits☆16Updated 9 months ago
- Vulnerable EDR☆16Updated 6 months ago