Set of my small utils related to cryptography, encoding, decoding etc
☆95Sep 1, 2025Updated 6 months ago
Alternatives and similar repositories for crypto_utils
Users that are interested in crypto_utils are comparing it to the libraries listed below
Sorting:
- A set of small utilities, helpers for PIN tracers☆37Feb 15, 2026Updated last month
- Archive of ransomware decryptors☆34Dec 7, 2017Updated 8 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆230Mar 22, 2023Updated 2 years ago
- Application for random attack on Green Petya's key☆25Jul 4, 2017Updated 8 years ago
- My metasploit modules☆24Jan 8, 2016Updated 10 years ago
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- Sample libraries to be used with IAT Patcher☆37Oct 1, 2022Updated 3 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆63Aug 21, 2024Updated last year
- Flare-On solutions☆37Oct 11, 2019Updated 6 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆99Jun 24, 2021Updated 4 years ago
- Demos of various (also non standard) persistence methods used by malware☆224Mar 5, 2023Updated 3 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Jan 8, 2022Updated 4 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆58Aug 6, 2025Updated 7 months ago
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Various scripts helpful in sorting collections of malware samples.☆38Aug 19, 2016Updated 9 years ago
- ☆23Feb 3, 2021Updated 5 years ago
- A wrapper for capstone for bearparser☆16Oct 8, 2025Updated 5 months ago
- Various snippets created during malware analysis☆464Oct 3, 2025Updated 5 months ago
- Small tool for disassembling shellcode (using objdump)☆149Jun 19, 2022Updated 3 years ago
- A small library helping to parse commandline parameters (for C/C++)☆57May 25, 2025Updated 9 months ago
- Password scrambler - a deterministic password re-generator (alternative to a password manager)☆132Jan 2, 2023Updated 3 years ago
- Dynamic unpacker based on PE-sieve☆797Sep 13, 2025Updated 6 months ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing☆29Oct 22, 2020Updated 5 years ago
- A decoder for Petya victim keys, using the Janus' masterkey.☆61Apr 14, 2022Updated 3 years ago
- A more stealthy variant of "DLL hollowing"☆363Mar 8, 2024Updated 2 years ago
- IFL - Interactive Functions List (plugin for IDA Pro)☆489Feb 27, 2026Updated 3 weeks ago
- A ready-made template for a project based on libpeconv.☆52Oct 31, 2025Updated 4 months ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- A CMake template for projects using MS Detours☆23Feb 18, 2025Updated last year
- The Python interface for YARA http://virustotal.github.io/yara/☆20Jul 13, 2017Updated 8 years ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆640Aug 30, 2022Updated 3 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Apr 13, 2018Updated 7 years ago
- Automatically rebuild Import Address Table for dumped PE file. With python bindings!☆121Jan 25, 2019Updated 7 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago