Various Malware-Related Utilities
☆10Aug 4, 2016Updated 9 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IDATACO IDA Pro Plugin☆46Jun 14, 2016Updated 9 years ago
- Malware analyses and helpful scripts☆30May 26, 2022Updated 3 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆57Nov 29, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Code for Rumal Backend that will interface with Thug Daemon☆11Nov 24, 2016Updated 9 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Uses AES to run encrypted shellcode using Python and ctypes☆14Jan 17, 2016Updated 10 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 12 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- Powershell tool to download malware samples.☆12Feb 10, 2016Updated 10 years ago
- Modified edition of cuckoo community modules☆50May 12, 2017Updated 8 years ago
- A warehouse for your malware☆136Nov 21, 2025Updated 4 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 11 months ago
- Malware monitor template based on MinHook☆17Mar 29, 2015Updated 11 years ago
- Malware analysis using Docker project☆25Mar 3, 2016Updated 10 years ago
- Popular Apks Downloader☆13Aug 21, 2013Updated 12 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Jun 19, 2014Updated 11 years ago
- random python stuff☆26Jan 7, 2016Updated 10 years ago
- ☆20Nov 22, 2016Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/malware-lu☆57May 21, 2019Updated 6 years ago
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- IP-ASN-history is a server software to store efficiently the history of BGP announces and quickly lookup IP addresses origins☆46Apr 1, 2022Updated 4 years ago
- A collection of offensive tools I've hacked together for CTFs and such☆20Aug 9, 2016Updated 9 years ago
- Win32 Python code for tracing malware activities on infected hosts☆26Jul 4, 2016Updated 9 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- En visuell integrasjon mellom Sbanken og You Need A Budget.☆14Aug 17, 2024Updated last year
- ☆13Aug 19, 2015Updated 10 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- Collection of scripts for radare2☆27Jan 1, 2019Updated 7 years ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 13 years ago
- Injected malicious code into legitimate andoid applications. Converted a keyboard app into a keylogger and an MP3 downloader into an imag…☆19Aug 8, 2014Updated 11 years ago
- ☆28Apr 18, 2016Updated 9 years ago