Set of my small utils related to cryptography, encoding, decoding etc
☆95Sep 1, 2025Updated 7 months ago
Alternatives and similar repositories for crypto_utils
Users that are interested in crypto_utils are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A set of small utilities, helpers for PIN tracers☆38Feb 15, 2026Updated last month
- Archive of ransomware decryptors☆34Dec 7, 2017Updated 8 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- Application for random attack on Green Petya's key☆25Jul 4, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- My metasploit modules☆24Jan 8, 2016Updated 10 years ago
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- Sample libraries to be used with IAT Patcher☆37Oct 1, 2022Updated 3 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆63Aug 21, 2024Updated last year
- Flare-On solutions☆37Oct 11, 2019Updated 6 years ago
- Demos of various (also non standard) persistence methods used by malware☆224Mar 5, 2023Updated 3 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆100Jun 24, 2021Updated 4 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Jan 8, 2022Updated 4 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆58Aug 6, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Various scripts helpful in sorting collections of malware samples.☆38Aug 19, 2016Updated 9 years ago
- ☆23Feb 3, 2021Updated 5 years ago
- A wrapper for capstone for bearparser☆16Oct 8, 2025Updated 6 months ago
- Various snippets created during malware analysis☆465Oct 3, 2025Updated 6 months ago
- Small tool for disassembling shellcode (using objdump)☆149Jun 19, 2022Updated 3 years ago
- A small library helping to parse commandline parameters (for C/C++)☆57Updated this week
- Password scrambler - a deterministic password re-generator (alternative to a password manager)☆132Jan 2, 2023Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Dynamic unpacker based on PE-sieve☆803Apr 1, 2026Updated last week
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing☆29Oct 22, 2020Updated 5 years ago
- A decoder for Petya victim keys, using the Janus' masterkey.☆61Apr 14, 2022Updated 3 years ago
- A more stealthy variant of "DLL hollowing"☆365Mar 8, 2024Updated 2 years ago
- IFL - Interactive Functions List (plugin for IDA Pro)☆491Feb 27, 2026Updated last month
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- Demo bootloaders - created just for fun☆23Jul 1, 2017Updated 8 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A CMake template for projects using MS Detours☆23Feb 18, 2025Updated last year
- The Python interface for YARA http://virustotal.github.io/yara/☆20Jul 13, 2017Updated 8 years ago
- Persistent IAT hooking application - based on bearparser☆265Sep 18, 2022Updated 3 years ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆641Aug 30, 2022Updated 3 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Apr 13, 2018Updated 7 years ago
- Automatically rebuild Import Address Table for dumped PE file. With python bindings!☆121Jan 25, 2019Updated 7 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 9 years ago