futex / ReverseLinks
☆13Updated 7 years ago
Alternatives and similar repositories for Reverse
Users that are interested in Reverse are comparing it to the libraries listed below
Sorting:
- TA505 unpacker Python 2.7☆47Updated 5 years ago
- ☆23Updated 5 years ago
- Royal Road RTF Weaponizer object decoder☆24Updated last year
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆55Updated 6 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- Antivirus Emulator Fingerprints☆29Updated 7 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago
- Capa analysis importer for Ghidra.☆63Updated 4 years ago
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 5 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 6 years ago
- ☆12Updated 5 years ago
- ☆11Updated 5 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 5 years ago
- ☆60Updated 5 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆43Updated 4 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 3 years ago
- ☆23Updated 4 years ago
- Another Repo of Malware. Enjoy. <3☆59Updated 6 years ago
- ☆43Updated 6 years ago
- Go Lang Portable Executable Parser☆38Updated 4 years ago
- ☆18Updated 5 years ago
- Brute-force script for finding azorult XOR key.☆14Updated 6 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
- A repository where I share my injection implemintations☆29Updated 5 years ago
- open source malware analysis and research notes dump☆26Updated 2 years ago
- Yaras Random☆22Updated 6 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆19Updated 4 years ago