endgameinc / Py2ExeDecompilerLinks
☆165Updated 8 years ago
Alternatives and similar repositories for Py2ExeDecompiler
Users that are interested in Py2ExeDecompiler are comparing it to the libraries listed below
Sorting:
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 7 years ago
- some pocs for antivirus evasion☆131Updated last year
- A tool to detect and crash Cuckoo Sandbox☆295Updated 10 months ago
- A collection of post-exploitation tools for network red teaming.☆138Updated 6 years ago
- ☆128Updated 9 years ago
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆99Updated 5 years ago
- Clone of hidden tear written in C++☆69Updated 4 years ago
- Your bag of handy codes for malware researchers☆120Updated 5 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆170Updated 6 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆216Updated 4 years ago
- Elevation by environment variable expansion☆65Updated 8 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆155Updated 5 years ago
- Python tools for interacting with a DarkComet Client☆54Updated 9 years ago
- Miscellaneous tools written in Python, mostly centered around shellcodes.☆146Updated 9 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆106Updated 5 years ago
- PyAna - Analyzing the Windows shellcode☆246Updated 9 years ago
- Collection of metasploit modules☆68Updated 8 years ago
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆282Updated 7 years ago
- Teaching old shellcode new tricks☆205Updated 7 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆128Updated 8 years ago
- Windows 7 UAC Bypass Vulnerability in the Windows Script Host☆105Updated 9 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- Tinba Banking Trojan☆85Updated 10 years ago
- Sublime Malware Research Tool☆66Updated 7 months ago
- Open Source Office Malware Generation & Polymorphic Engine for Red Teams and QA testing☆95Updated 8 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 7 years ago
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.☆230Updated last year
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year