A script to reverse-engineer anti-virus signatures
☆32Mar 20, 2013Updated 13 years ago
Alternatives and similar repositories for avwhy
Users that are interested in avwhy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Perform WiFi scans from python in OSX. Simply import this module and run wifi_scan()☆18Feb 27, 2016Updated 10 years ago
- Suspend and resume processes by using functions in ntdll.dll.☆15Feb 23, 2014Updated 12 years ago
- A PE Header-Based Antivirus Tool☆12Nov 14, 2014Updated 11 years ago
- Native Android software for dumping memory from Android processes☆14Sep 18, 2014Updated 11 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 10 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- My presentations from different conferences☆15Sep 12, 2018Updated 7 years ago
- BurpSuite Pro Python Extension☆18Jul 11, 2013Updated 12 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Win32 Python code for tracing malware activities on infected hosts☆26Jul 4, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Apr 13, 2015Updated 10 years ago
- API Tracker by Cysinfo Team☆22Oct 12, 2016Updated 9 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Shellyzer Gui is a simple desktop application that helps you analyze shellcode (disassemble shellcode) in well view and i will add many f…☆12Jun 23, 2015Updated 10 years ago
- A(nother) Binary Analysis Framework☆31Jun 10, 2014Updated 11 years ago
- C code metamorphic obfuscator☆13Feb 20, 2015Updated 11 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- various exploits☆32Jul 7, 2012Updated 13 years ago
- Network Keylogger is an open source program that sends every key pressed in a computer to another computer, via TCP/IP. It can be used to…☆41Apr 25, 2011Updated 14 years ago
- ☆11Jun 10, 2015Updated 10 years ago
- Intel PIN rocks☆15Jun 5, 2012Updated 13 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- Examine, a memory leak checker on Windows☆13Jun 4, 2016Updated 9 years ago
- MLRan: A Ransomware Behavioural Dataset for Machine Learning☆46Jun 17, 2025Updated 9 months ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Jul 16, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A cross-platform custom NOR firmware loader and custom IPSW generator for the iPhone☆16Oct 11, 2014Updated 11 years ago
- Static analysis plugin for x64dbg (now deprecated).☆29Jul 13, 2014Updated 11 years ago
- transparent TCP-to-proxy redirector☆16Dec 8, 2019Updated 6 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24May 14, 2011Updated 14 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 8 years ago