☆16Dec 5, 2023Updated 2 years ago
Alternatives and similar repositories for kordesii
Users that are interested in kordesii are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆341Feb 7, 2025Updated last year
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- Module for decompressing aPLib compressed data☆17Aug 25, 2022Updated 3 years ago
- Query network abuse contacts for a given ip address on abuse-contacts.abusix.zone☆20Nov 13, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A collection of useful radare2 scripts!☆32Feb 2, 2018Updated 8 years ago
- A ConfuserEx-custom deobfuscation toolchain☆53Aug 4, 2017Updated 8 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- Community modules for FAME☆65Dec 16, 2025Updated 3 months ago
- The object of the Digital Crime Scene Challenge is for participants to use their forensic and investigative skills to focus on potential …☆39Jul 30, 2013Updated 12 years ago
- ☆16Mar 20, 2026Updated last week
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- C Bindings to BAP☆16Jul 13, 2022Updated 3 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- BAP python bindings☆22Dec 1, 2023Updated 2 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆23May 4, 2016Updated 9 years ago
- Daily digest of your rss feeds☆12Jul 30, 2016Updated 9 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆30Nov 26, 2024Updated last year
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This IDAPython script tags subroutines according to their use of imported functions☆74May 26, 2021Updated 4 years ago
- ☆22Sep 27, 2017Updated 8 years ago
- A Rust command-line tool for decoding Alpha2-based shellcode.☆11Dec 16, 2020Updated 5 years ago
- ☆107May 25, 2022Updated 3 years ago
- ☆20Sep 8, 2019Updated 6 years ago
- command line tool to use the DNSDB Flexible Search API extensions.☆16Aug 5, 2024Updated last year
- Play 2048 in notepad.exe☆13Feb 16, 2015Updated 11 years ago
- A tool to generate yara signatures from function blocks☆19Dec 8, 2014Updated 11 years ago
- $ gem install esearchy [ NO LONGER MAINTAINED - ONLY FIXES AND MINOR UPDATES ] https://github.com/FreedomCoder/esearchy_mirai☆18Jul 6, 2012Updated 13 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Oct 3, 2015Updated 10 years ago
- Charts directives for AngularJS (using RaphaelJS)☆29Sep 16, 2015Updated 10 years ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- Emu-strings project - JScript/VBScript automated dropper analysis system☆18Mar 25, 2021Updated 5 years ago
- A Lightweight Malware Configuration Parsing Tool☆15Nov 6, 2019Updated 6 years ago
- A tool to dynamically inspect macro execution in Office documents☆13Aug 13, 2016Updated 9 years ago