Malware Analysis Tools
☆33Oct 26, 2019Updated 6 years ago
Alternatives and similar repositories for Malware-Analysis-Tools
Users that are interested in Malware-Analysis-Tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆23Jan 1, 2023Updated 3 years ago
- Learning volatility plugins.☆19Feb 16, 2021Updated 5 years ago
- ☆11Feb 6, 2023Updated 3 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Mar 8, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 3 years ago
- Encode or decode base64 or base32 using a custom alphabet☆12Jan 29, 2019Updated 7 years ago
- A Python-based automation tool for interacting with the Burp Suite API to run scans and retrieve vulnerability data programmatically.☆10Oct 3, 2022Updated 3 years ago
- Misc stuff from internet☆12Apr 13, 2026Updated 3 weeks ago
- Network sinkhole for isolated malware analysis☆40Mar 5, 2018Updated 8 years ago
- My Malware Analysis Reports☆25May 24, 2022Updated 3 years ago
- labs for binary exploitation☆13Jul 16, 2019Updated 6 years ago
- BlackHat scrapy for download all the pdf file☆30Jun 7, 2024Updated last year
- This was made with the intention of providing evidence of work done towards furthering education in cyber security.☆12May 12, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A list of awesome malware detection tools☆85Jul 8, 2022Updated 3 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- A collection of Security Bookmarks☆11Oct 9, 2021Updated 4 years ago
- Chrome extension that redacts potentially sensitive information before querying ChatGPT☆12Aug 10, 2023Updated 2 years ago
- ☆19Feb 14, 2022Updated 4 years ago
- Symbolic execution engine for Whitespace.☆14May 30, 2021Updated 4 years ago
- A collection of beautified and commented samples of malware implemented in Bash☆23Apr 4, 2023Updated 3 years ago
- Simple Secure Static (HTTPS) File Server with embedded certificate☆48Apr 9, 2023Updated 3 years ago
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆21Aug 11, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 自动化Google Hacking URL搜集工具☆10Apr 20, 2024Updated 2 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- A stealthy C++ shellcode loader using anti-analysis checks, AES-256 decryption, and dynamic memory permissions to evade detection. Includ…☆21Apr 2, 2025Updated last year
- A python script that converts input character strings to QR Code using emojis. The output can be copied & pasted where desired.☆12Jun 25, 2019Updated 6 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- Solarized Theme for IDA Pro 7.3 and above☆15Nov 28, 2024Updated last year
- Anti-Malware security solution for Windows environment.☆20Jul 10, 2021Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Sep 15, 2015Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆27Sep 15, 2023Updated 2 years ago
- Capture The Flag competition challenge write-ups☆23Apr 17, 2026Updated 2 weeks ago
- Fork of XCT clean kali install with sprinkling of theGuildHall pwnbox implementation and some love <3.☆11Aug 16, 2023Updated 2 years ago
- Tool for using libc infoleaks to identify libc version from within your exploit.☆13Dec 29, 2022Updated 3 years ago
- Reverse engineering challenges☆52Nov 3, 2019Updated 6 years ago
- Provides mechanism to use ActiveRecord as an authenticator for CASino.☆20Mar 26, 2020Updated 6 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago