Basic SDK for Intezer Analyze API 2.0
☆31Feb 22, 2026Updated last week
Alternatives and similar repositories for analyze-python-sdk
Users that are interested in analyze-python-sdk are comparing it to the libraries listed below
Sorting:
- ☆27Jun 29, 2023Updated 2 years ago
- ☆16Dec 14, 2017Updated 8 years ago
- Full reversing of the Microsoft Auxiliary Windows API Library and ported to C☆24Dec 17, 2024Updated last year
- MFT and USN parser that allows direct extraction in filesystem timeline format (mactime), dump all resident files in the MFT in their ori…☆13May 10, 2023Updated 2 years ago
- ☆42May 30, 2019Updated 6 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆84Feb 11, 2026Updated 2 weeks ago
- Simple AutoIt crypter.☆11Mar 3, 2017Updated 8 years ago
- The Application can convert the .py file into exe for faster transformation and can result to build an app in a single click☆11Mar 2, 2022Updated 3 years ago
- ☆36Sep 5, 2017Updated 8 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- Windows DLL Loading Utility☆12Jun 11, 2020Updated 5 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆11Aug 13, 2019Updated 6 years ago
- ☆11Apr 24, 2020Updated 5 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- An IP Logger☆12Jun 10, 2021Updated 4 years ago
- GSoC Issue tracking for mitmweb.☆12Apr 27, 2016Updated 9 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- ☆21Jan 7, 2019Updated 7 years ago
- Python bindings for AsmJit☆12Aug 13, 2012Updated 13 years ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 7 months ago
- This project demonstrating multiple protection and anti-analysis techniques, including self-modifying code.☆14Oct 9, 2023Updated 2 years ago
- InternetOff turns access to the Internet off and on again, without affecting access to the local network. It is a small program that work…☆13Jan 1, 2020Updated 6 years ago
- Plugin to assist in reverse engineering programs that use JNI.☆11Apr 27, 2017Updated 8 years ago
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆14Aug 11, 2023Updated 2 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- Docker compose Assemblyline 4 deployment (appliance and development)☆17Feb 19, 2026Updated last week
- ☆10Jul 8, 2014Updated 11 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a firewall-evading backdoor, and reroutin…☆10Dec 23, 2014Updated 11 years ago
- Outil de triage automatisé de différents types de collectes d'artefacts.☆17Dec 8, 2025Updated 2 months ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Dynamic Identification and Recognition Technology☆10Nov 1, 2016Updated 9 years ago
- ☆13Apr 14, 2021Updated 4 years ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- Plugin manager plugin for x64dbg.☆48Aug 7, 2025Updated 6 months ago
- Inject libraries into 32 processes on macOS Mojave☆16Mar 2, 2020Updated 5 years ago
- WhoCalls can query a directory of files, find the binaries, and search for a user specified Win API import. It and works with both 32-bit…☆18Jul 2, 2022Updated 3 years ago
- ☆40Feb 25, 2016Updated 10 years ago
- Toolkit for flashbots searcher tx☆10Apr 13, 2021Updated 4 years ago
- ☆10Sep 17, 2023Updated 2 years ago