Reverse engineering malware samples
☆16Dec 3, 2021Updated 4 years ago
Alternatives and similar repositories for malware-anlaysis
Users that are interested in malware-anlaysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Utilizing DLang For Offensive Operations.☆14May 29, 2025Updated 9 months ago
- Near compile-time string obfuscation for Golang☆13Oct 3, 2023Updated 2 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆16Dec 21, 2021Updated 4 years ago
- HardwareTurningPoint, Fully Go Compatible Hardware Breakpoint☆16Jan 30, 2025Updated last year
- Kill malawarebytes process. Can be ported to any programming language.☆12Apr 21, 2025Updated 11 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Spoof the return address of any function call.☆11Jul 21, 2024Updated last year
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Apr 21, 2025Updated 11 months ago
- golang decryption poc of the new app bound encryption introduced in chrome version 127.☆22Nov 4, 2024Updated last year
- ☆37Nov 8, 2024Updated last year
- A tool written in golang which compress using UPX and patch it with the provided PE file to make "UPX -d" flag impossible to decompress a…☆31Jan 2, 2025Updated last year
- Binary Ninja plugin to deobfuscate strings obfuscated with the Garble project☆44Mar 6, 2025Updated last year
- Dynamic COFF object loader☆23Jun 29, 2018Updated 7 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Aug 21, 2023Updated 2 years ago
- Shellcode encoder&loader written in Go language, which can encrypt binary or PE files. It offers a variety of complex encryption algorith…☆20May 24, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Ransomware written in go, encrypt - decrypt.☆30Apr 27, 2025Updated 11 months ago
- Clumsy 0.3 with keybinds☆11Apr 16, 2024Updated last year
- Decrypting and intercepting encrypted imports of Vanguards Kernel Driver☆34Feb 13, 2024Updated 2 years ago
- extract chromium-based browser's cookies using chrome's remote debugging without admin rights☆22Nov 3, 2024Updated last year
- brute but stronger☆11Aug 4, 2022Updated 3 years ago
- MazzCrypt - You won't ever get caught. A [was-private] polymorphic source code parser to randomize executables. Inspired by PolyLoader by…☆13Aug 29, 2016Updated 9 years ago
- Discord HTTP requests interception POC, including backup codes requests, for educational purposes only.☆25Jul 11, 2024Updated last year
- Javascript keylogger in a chrome extension that sends keystrokes to discord☆10Jan 5, 2024Updated 2 years ago
- Current setup - Arch Linux + sway☆14Oct 2, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Adds buttons to more easily hoard images from Reddit☆17Feb 15, 2026Updated last month
- ☆29Oct 19, 2024Updated last year
- Best Repo for learn DDOS ( Send me Stars ⭐ )☆38Feb 5, 2026Updated last month
- A collection of exploits or general scripts that often come in handy during CTFs☆10Apr 29, 2020Updated 5 years ago
- Header only library for obfuscation import winapi functions.☆43Feb 12, 2025Updated last year
- Golang bindings for the Binary Ninja Arm64 Disassembler.☆14Mar 16, 2026Updated last week
- Registers Vectored Exception Handlers by directly manipulating internal LdrpVectorHandlerList structure instead of calling RtlAddVectored…☆36Jan 18, 2026Updated 2 months ago
- Advanced Encryption Standard On-the-Fly mode in Julia☆13Aug 19, 2020Updated 5 years ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Apr 21, 2025Updated 11 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- Exodus and Atomic crypto wallets app.asar injection POC (captures mnemonic and password) for educational purposes only.☆24Jul 3, 2024Updated last year
- sample bypass anti-anti-debug tool by race condition☆28Aug 2, 2022Updated 3 years ago
- An IDA plugin to deobfuscate Pikabot's strings using RC4 and AES☆13Apr 8, 2024Updated last year
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 11 months ago
- IDA SQL - Interface with IDA in SQL via live virtual tables☆173Mar 18, 2026Updated last week
- An example of an external LLVM plugin module transform pass for the latest versions.☆14Oct 21, 2025Updated 5 months ago