☆27Mar 1, 2017Updated 9 years ago
Alternatives and similar repositories for malware-botnets
Users that are interested in malware-botnets are comparing it to the libraries listed below
Sorting:
- A curated list of tools for incident response☆34Mar 2, 2024Updated 2 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- ☆20Aug 19, 2017Updated 8 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- My Personal Library for CTF's☆12Apr 3, 2018Updated 7 years ago
- A clone of Windows Security Center mainly useful for demonstrating Windows APIs for accessing Firewall/AntiVirus/AntiSpyware/Windows Upda…☆12May 10, 2010Updated 15 years ago
- Visually analyze basic block code coverage in Binary Ninja using Pin output.☆11Oct 6, 2017Updated 8 years ago
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- ☆12Apr 13, 2017Updated 8 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- ☆11Aug 11, 2014Updated 11 years ago
- A README.md compilation of useful links for CS students. These range from building cool projects, recruiting, and other random CS-related…☆11Jul 6, 2018Updated 7 years ago
- Yet another IDA Pro real time syncing plugin☆16Mar 27, 2018Updated 7 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆16Sep 21, 2020Updated 5 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Oct 27, 2011Updated 14 years ago
- UI的一些用于快速验证某个问题的代码☆12Jun 25, 2012Updated 13 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆30Jul 6, 2017Updated 8 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Jun 9, 2013Updated 12 years ago
- Binarly SDK v1☆14Dec 18, 2016Updated 9 years ago
- ActionScript ByteCode Disassembler☆16Oct 20, 2015Updated 10 years ago
- note without the e(vernote), the quickest dirtiest cli evernote client ever☆10Apr 30, 2016Updated 9 years ago
- win32 SnapShot☆15Jun 29, 2017Updated 8 years ago
- D-RAT SRC Extract☆12Dec 24, 2016Updated 9 years ago
- A C++ RDP implement, base RDPY☆16Jun 2, 2024Updated last year
- A collection of Open Data for the data freaks out there.☆37Jan 4, 2018Updated 8 years ago
- Small backdoor using cookie.☆63Oct 18, 2016Updated 9 years ago
- S2E Core Engine Library☆15Jan 7, 2020Updated 6 years ago
- Aranea is a fast and clean dns spoofing tool.☆17Sep 20, 2011Updated 14 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆18Oct 7, 2016Updated 9 years ago
- BlackWorm SRC Extract☆16Dec 24, 2016Updated 9 years ago
- Windows Vpn Scripter☆14Dec 7, 2016Updated 9 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆58Jun 23, 2017Updated 8 years ago
- Mock malware to show the process of how a polymorphic virus takes control over directories while encrypting, locking files, and injects i…☆12Dec 27, 2018Updated 7 years ago
- Getting windows operating system version information by 3 ways. using APIs,GetVersionEx, VerifyVersionInfo☆13Apr 9, 2015Updated 10 years ago
- Nj RAT Stub☆14Dec 24, 2016Updated 9 years ago
- random RE stuff☆21May 11, 2012Updated 13 years ago
- C++/C botnet using HTTP C&C☆16Jan 21, 2015Updated 11 years ago