Malware diversity
☆51Dec 2, 2015Updated 10 years ago
Alternatives and similar repositories for MalDiv
Users that are interested in MalDiv are comparing it to the libraries listed below
Sorting:
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆16Apr 17, 2017Updated 8 years ago
- ☆14Feb 18, 2021Updated 5 years ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Dec 21, 2018Updated 7 years ago
- Sandbox d'analyse de malware pour Windows 7 avec un client TCP en mode noyau☆19Feb 23, 2016Updated 10 years ago
- A 2D maze solver☆26Apr 8, 2015Updated 10 years ago
- Reverse Engineering tool for Ethereum EVM☆20Jun 30, 2016Updated 9 years ago
- libdft for win☆52Jul 8, 2013Updated 12 years ago
- Pomodoro timer using React Native☆10Jun 3, 2020Updated 5 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- Simple, beautiful discussion forums - for customer support, news aggregation, QA sites, and online communities.☆56Dec 9, 2012Updated 13 years ago
- ☆39Sep 27, 2022Updated 3 years ago
- React Native unit testing☆11Feb 2, 2016Updated 10 years ago
- 视频播放(编辑)引擎☆10Jul 16, 2022Updated 3 years ago
- Python embedded in MATLAB extension module☆22Nov 24, 2013Updated 12 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- API para el DRAE☆20May 30, 2019Updated 6 years ago
- 人人网小黄鸡☆21Jan 4, 2013Updated 13 years ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- PoC code for android RCE with multidex and ZIP files☆40Feb 1, 2016Updated 10 years ago
- Linearly interpolate two numbers, but snap to the closest value if the difference between them is small enough☆12Aug 20, 2015Updated 10 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Extendable mongoose-like schemas for node.js and the browser☆14Feb 17, 2017Updated 9 years ago
- Gain root privilege by exploiting CVE-2014-3153 vulnerability☆16Sep 27, 2018Updated 7 years ago
- ☆12Nov 14, 2023Updated 2 years ago
- A python implementation of the paper "GraRep: Learning Graph Representations with Global Structural Information".☆11Jun 7, 2017Updated 8 years ago
- Check if a DOM element matches a given selector.☆20Aug 18, 2015Updated 10 years ago
- Data-flow Analysis Visualizer☆10Dec 9, 2021Updated 4 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- funky fun fuzzer☆11Jul 6, 2021Updated 4 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Fault code reader☆11Oct 31, 2016Updated 9 years ago
- Some of example code that I have collected while learning☆10Sep 25, 2016Updated 9 years ago
- Wraps a watchify instance into an HTTP request handler☆10Nov 5, 2016Updated 9 years ago
- Forward-looking approach in process mining (using system dynamics and process mining to simulate business processes)☆12Feb 16, 2023Updated 3 years ago
- DEPRECATED: Pastebin clone built with AngularJS and CouchDB☆19Apr 25, 2015Updated 10 years ago
- CAN Firewall project☆13Dec 17, 2015Updated 10 years ago
- Repository for team's work on the Microsoft Malware Classification Challenge Kaggle competition.☆11Mar 17, 2015Updated 10 years ago