A curated list of awesome malware analysis tools and resources
☆45Jul 17, 2020Updated 5 years ago
Alternatives and similar repositories for awesome-malware-analysis
Users that are interested in awesome-malware-analysis are comparing it to the libraries listed below
Sorting:
- A curated list of tools for incident response☆21Sep 24, 2019Updated 6 years ago
- A curated list of awesome big data frameworks, ressources and other awesomeness.☆17Oct 4, 2021Updated 4 years ago
- 🚗 A curated list of resources for learning about vehicle security and car hacking☆15Oct 4, 2021Updated 4 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- A curated list of awesome social engineering resources.☆15May 29, 2017Updated 8 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆15Jun 3, 2016Updated 9 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆25Jan 4, 2017Updated 9 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆17Feb 11, 2017Updated 9 years ago
- Personal repository with handy cheatsheets.☆16Oct 23, 2016Updated 9 years ago
- A collection of SSL/TLS security related resources.☆56Jan 13, 2025Updated last year
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Bring libfuzzer to Unicorn☆26Jan 23, 2022Updated 4 years ago
- awesome-windows-security-development☆178Mar 15, 2018Updated 7 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated last month
- Official Black Hat Arsenal Security Tools Repository☆12Aug 3, 2017Updated 8 years ago
- ☆13Jul 11, 2017Updated 8 years ago
- ☆76Sep 30, 2021Updated 4 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Dec 20, 2018Updated 7 years ago
- source code of XCTF 2019 Final web task "tfboys"☆30Nov 21, 2022Updated 3 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- LLM-Powered Code Security Scanning☆20Apr 2, 2025Updated 11 months ago
- ☆32Jun 10, 2020Updated 5 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆86Apr 9, 2019Updated 6 years ago
- IDA Pro плагин для отображения результата Coresight ETM трассировки perf'а☆17Sep 4, 2018Updated 7 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- H2HC 2019 Slides/Materials/Presentations☆56Dec 17, 2019Updated 6 years ago
- transfer ownership of any FB50 smart lock to yourself (CVE-2019-13143)☆16Aug 7, 2019Updated 6 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Oct 2, 2019Updated 6 years ago
- Network white noise collector☆19Mar 23, 2016Updated 9 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 8 years ago
- CTF box with most tools installed☆89Aug 22, 2018Updated 7 years ago
- An IDA Pro Plugin for embedding an IPython Kernel☆64Oct 27, 2019Updated 6 years ago
- Remote agent used for processing distributed jobs☆15Dec 15, 2021Updated 4 years ago
- Rode0day API Client☆18Jan 9, 2019Updated 7 years ago
- A web front-end for password cracking and analytics☆16Jan 6, 2019Updated 7 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- 一些研究☆14Dec 18, 2019Updated 6 years ago