☆23Feb 3, 2021Updated 5 years ago
Alternatives and similar repositories for tag_converter
Users that are interested in tag_converter are comparing it to the libraries listed below
Sorting:
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- A CMake template for projects using MS Detours☆23Feb 18, 2025Updated last year
- A wrapper for capstone for bearparser☆16Oct 8, 2025Updated 4 months ago
- A small library helping to parse commandline parameters (for C/C++)☆57May 25, 2025Updated 9 months ago
- My metasploit modules☆24Jan 8, 2016Updated 10 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Feb 15, 2022Updated 4 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- win32json Parser for TypeLibrary creation☆12Feb 10, 2022Updated 4 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- Flare-On solutions☆37Oct 11, 2019Updated 6 years ago
- Sample libraries to be used with IAT Patcher☆37Oct 1, 2022Updated 3 years ago
- ☆23Mar 17, 2024Updated last year
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated last year
- Windows process injection methods☆18Jul 18, 2021Updated 4 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- ☆17May 7, 2025Updated 10 months ago
- vstruct based dissectors for various file/protocol formats☆15Jul 27, 2017Updated 8 years ago
- MalDev & AV-EDR Evasion for Pentesters☆20Feb 17, 2023Updated 3 years ago
- A shellcode crypto-packing tool for PoC (used with msfvenom payloads)☆17Feb 10, 2023Updated 3 years ago
- Registry timestamp manipulation☆18Feb 26, 2014Updated 12 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- ☆17Feb 15, 2022Updated 4 years ago
- A set of small utilities, helpers for PIN tracers☆37Feb 15, 2026Updated 2 weeks ago
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- A ready-made template for a project based on libpeconv.☆52Oct 31, 2025Updated 4 months ago
- ☆18Apr 4, 2019Updated 6 years ago
- ☆18Mar 26, 2024Updated last year
- Docker kinsing malware bitcoin/xmr miner☆23Feb 18, 2021Updated 5 years ago
- Automatically exported from code.google.com/p/narly☆24Jul 11, 2021Updated 4 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- miscellaneous stuff☆21Mar 31, 2015Updated 10 years ago
- Utilities for working with vivisect☆26Oct 1, 2025Updated 5 months ago
- ☆23Dec 15, 2022Updated 3 years ago
- Demo bootloaders - created just for fun☆23Jul 1, 2017Updated 8 years ago
- Application for random attack on Green Petya's key☆25Jul 4, 2017Updated 8 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆99Jun 24, 2021Updated 4 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Apr 13, 2018Updated 7 years ago
- Set of my small utils related to cryptography, encoding, decoding etc☆95Sep 1, 2025Updated 6 months ago