eastmountyxz / Malicious-Code-DetectionView external linksLinks
该资源为恶意代码检测与识别的相关链接汇总,希望对您有所帮助!
☆21Jun 27, 2020Updated 5 years ago
Alternatives and similar repositories for Malicious-Code-Detection
Users that are interested in Malicious-Code-Detection are comparing it to the libraries listed below
Sorting:
- 该资源为恶意代码检测相关的论文或文章总结,包括作者撰写的恶意代码与机器学习、深度学习相关博客,希望对您有所帮助~☆15Jul 25, 2020Updated 5 years ago
- 该资源主要是作者翻译各大安全厂商的APT报告,希望对您有所帮助。☆20Nov 23, 2020Updated 5 years ago
- SyscallLoader☆11Sep 13, 2021Updated 4 years ago
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 5 years ago
- cobalt strike 自用脚本☆29Oct 29, 2020Updated 5 years ago
- ☆11Jan 29, 2021Updated 5 years ago
- 从入门到放弃的产物,学习过程中用python实现的一个单点c2基本功能☆11Mar 11, 2020Updated 5 years ago
- 从zoomeye or shodan or file 获取目标进行攻击。☆17Nov 21, 2019Updated 6 years ago
- 动态加解密shellcode并上线☆24Jul 10, 2021Updated 4 years ago
- 基于深度学习的恶意代码检测☆19Jun 12, 2020Updated 5 years ago
- 高版本Fastjson在Java原生反序列化中的利用演示☆26Jan 12, 2025Updated last year
- Persistent through COM Hijacking☆22Jan 15, 2019Updated 7 years ago
- Powershell / C# based cross platform forensic framework based for live incident response☆23Jul 5, 2020Updated 5 years ago
- Loads shellcode from a resource file.☆22Aug 15, 2019Updated 6 years ago
- Add export function and convert exe to dll☆26Sep 20, 2020Updated 5 years ago
- AWVS12&AWVS13 通用API批量导入脚本 AWVS12 & AWVS13 common API batch import script.☆25Mar 3, 2022Updated 3 years ago
- 通过burp代理流量寻找shiro站点☆60Jun 11, 2020Updated 5 years ago
- Python wrapper for the Mitre ATT&CK framework API☆30Mar 12, 2018Updated 7 years ago
- DLInjector for Graphical User Interface.☆35Jan 28, 2021Updated 5 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Feb 22, 2020Updated 5 years ago
- ☆38Jul 14, 2020Updated 5 years ago
- MSFRottenPotato built as a Reflective DLL. Work in progress. Gotta love Visual C++☆31Oct 25, 2018Updated 7 years ago
- Dumps information about all the callback objects found in a dump file and the functions registered for them☆37Oct 21, 2020Updated 5 years ago
- 感染PE文件的病毒学习过程☆32Jan 14, 2021Updated 5 years ago
- Phoenix Framework Project☆42Oct 6, 2021Updated 4 years ago
- A Golang Reverse Shell Tool With AES Dynamic Encryption☆84Mar 16, 2020Updated 5 years ago
- 具备对PE文件添加区段、添加花指令、对代码段加密、修复重定位、加密IAT等功能☆59Jan 12, 2020Updated 6 years ago
- 驱动开发工具包☆11Dec 8, 2018Updated 7 years ago
- 内存加载FRP☆10Sep 11, 2023Updated 2 years ago
- 正在写的一个资产管理和扫描相结合的分布式扫描器☆39Jul 6, 2022Updated 3 years ago
- PoC for hiding processes from Windows Task Manager by manipulating the graphic interface☆47May 4, 2020Updated 5 years ago
- sprint encode (plan text) get enc password☆45Sep 27, 2021Updated 4 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Jun 6, 2023Updated 2 years ago
- 使得Cobaltstrike支持Atexec☆89Jun 30, 2020Updated 5 years ago
- Code with Windows Hacker☆12Oct 14, 2022Updated 3 years ago
- 该资源为杨秀璋作者《Python网络数据爬取及分析从入门到精通(分析篇)》书籍所有源代码,包括可视化分析、聚类分析、回归分析、分类分析、词云和LDA分析等内容。所有代码已修改为Python3实现,希望对您有所帮助,一起加油。☆11Aug 12, 2021Updated 4 years ago
- ☆17Jun 16, 2025Updated 7 months ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- Docker image: DNS over HTTPS proxy☆11Jun 26, 2020Updated 5 years ago