A script to reverse-engineer anti-virus signatures
☆32Mar 20, 2013Updated 13 years ago
Alternatives and similar repositories for avwhy
Users that are interested in avwhy are comparing it to the libraries listed below
Sorting:
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Perform WiFi scans from python in OSX. Simply import this module and run wifi_scan()☆18Feb 27, 2016Updated 10 years ago
- Suspend and resume processes by using functions in ntdll.dll.☆15Feb 23, 2014Updated 12 years ago
- A PE Header-Based Antivirus Tool☆12Nov 14, 2014Updated 11 years ago
- Collection of ezine about virii☆17Sep 13, 2022Updated 3 years ago
- Native Android software for dumping memory from Android processes☆14Sep 18, 2014Updated 11 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 10 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- My presentations from different conferences☆15Sep 12, 2018Updated 7 years ago
- BurpSuite Pro Python Extension☆18Jul 11, 2013Updated 12 years ago
- Win32 Python code for tracing malware activities on infected hosts☆26Jul 4, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Apr 13, 2015Updated 10 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆11Aug 13, 2019Updated 6 years ago
- PsSetCreateProcessNotifyRoutine/Ex/Ex2 hook☆13May 30, 2024Updated last year
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- A(nother) Binary Analysis Framework☆30Jun 10, 2014Updated 11 years ago
- C code metamorphic obfuscator☆13Feb 20, 2015Updated 11 years ago
- Generates random utf-8 strings for fuzz t�sting character encoding probl�ms☆11Aug 21, 2015Updated 10 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- various exploits☆32Jul 7, 2012Updated 13 years ago
- ☆11Jun 10, 2015Updated 10 years ago
- Intel PIN rocks☆15Jun 5, 2012Updated 13 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- Examine, a memory leak checker on Windows☆13Jun 4, 2016Updated 9 years ago
- MLRan: A Ransomware Behavioural Dataset for Machine Learning☆46Jun 17, 2025Updated 9 months ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Jul 16, 2020Updated 5 years ago
- A cross-platform custom NOR firmware loader and custom IPSW generator for the iPhone☆16Oct 11, 2014Updated 11 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Mar 5, 2014Updated 12 years ago
- Static analysis plugin for x64dbg (now deprecated).☆29Jul 13, 2014Updated 11 years ago
- Spawns JupyterHub single user servers in Marathon☆11Oct 8, 2017Updated 8 years ago
- transparent TCP-to-proxy redirector☆16Dec 8, 2019Updated 6 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago