Evomalware is a simple BASH script do detect malwares/virus/backdoor/... especially for PHP files.
☆87Sep 30, 2015Updated 10 years ago
Alternatives and similar repositories for evomalware
Users that are interested in evomalware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Jan 31, 2015Updated 11 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- A network analysis algorithm for detecting bots on large networks.☆20Apr 15, 2013Updated 12 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- On the fly TCP and UDP network fuzzer☆16Jan 3, 2020Updated 6 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- Google BigQuery API using service account credentials.☆21Feb 22, 2016Updated 10 years ago
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- A heuristic, python-based detector for fast-flux botnets.☆13Feb 24, 2012Updated 14 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Aug 12, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- PoC Android smart phone botnet☆79Aug 4, 2012Updated 13 years ago
- Mini CA☆12Sep 7, 2015Updated 10 years ago
- A collection of shellcodes for BSD and Linux for exploit development☆26May 13, 2011Updated 14 years ago
- a MITM attack tool☆85Sep 9, 2015Updated 10 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- OWASP Web Application Testing Cheat Sheet converted to tool formats☆25Jan 20, 2017Updated 9 years ago
- Some slides from some presentations I have given☆25Jan 2, 2016Updated 10 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Win32 Python code for tracing malware activities on infected hosts☆26Jul 4, 2016Updated 9 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Miscellaneous Tools☆37May 31, 2015Updated 10 years ago
- ☆16Apr 11, 2017Updated 8 years ago
- Bro is a powerful network analysis framework that is much different from the typical IDS you may know. Official mirror of git.bro.org/br…☆10Aug 16, 2014Updated 11 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Patching Flash binary to stop Flash exploits and zero-days☆62Apr 18, 2017Updated 8 years ago
- some tasks/solutions from CTF challenges☆68Nov 9, 2016Updated 9 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆44Jun 7, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- Exploits, Fuzzers, Scripts etc☆35Dec 30, 2025Updated 2 months ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆37Aug 20, 2013Updated 12 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Jun 8, 2015Updated 10 years ago