Windows API Hashes used in the malwares
☆42Aug 7, 2015Updated 10 years ago
Alternatives and similar repositories for WindowsAPIhash
Users that are interested in WindowsAPIhash are comparing it to the libraries listed below
Sorting:
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- ShellCodeLoader via DInvoke☆60Jul 5, 2021Updated 4 years ago
- ☆22Jan 7, 2021Updated 5 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- p0f Python Wrapper☆17Sep 29, 2013Updated 12 years ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- An IDA plugin to deobfuscate Pikabot's strings using RC4 and AES☆13Apr 8, 2024Updated last year
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- A PE Header-Based Antivirus Tool☆11Nov 14, 2014Updated 11 years ago
- Collection of Praetorian solutions to CTF challenges☆25Apr 20, 2018Updated 7 years ago
- A collection of pcaps☆16Jul 5, 2015Updated 10 years ago
- Load shellcode via syscall☆56Jul 28, 2021Updated 4 years ago
- ☆24Apr 22, 2025Updated 10 months ago
- ☆18Nov 24, 2020Updated 5 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- 010 Editor Template for parsing VMware Disk(vmdk) images☆16Sep 12, 2018Updated 7 years ago
- IDA plugin to deobfuscate emotet CFF☆18Apr 26, 2022Updated 3 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- Python regex generator (list of strings => Regex)☆12Jun 21, 2022Updated 3 years ago
- Write-ups for crackmes and CTF challenges☆53Nov 24, 2022Updated 3 years ago
- RDI implementation in Nim☆64Dec 12, 2020Updated 5 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Apr 13, 2015Updated 10 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Aug 25, 2014Updated 11 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- Repository for dirty scripts and PoCs☆20Feb 18, 2025Updated last year
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- Code Injector Using Code Caves☆15Jul 12, 2015Updated 10 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 10 years ago
- ☆21Mar 16, 2021Updated 4 years ago
- ☆15Aug 1, 2023Updated 2 years ago