Mozi Botnet related tools helping to unpack a sample, decode a configuration and track active Mozi nodes using DHT.
☆48Nov 13, 2022Updated 3 years ago
Alternatives and similar repositories for mozitools
Users that are interested in mozitools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AutoIt Obfuscator (Python module) lets you protect AutoIt script source code against analysis, reverse engineering, and decompilation usi…☆13Nov 27, 2025Updated 3 months ago
- ☆13Jul 11, 2017Updated 8 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆14Mar 19, 2020Updated 6 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Oct 27, 2011Updated 14 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆27Oct 19, 2023Updated 2 years ago
- Small App for reading from MHN's hpfeeds broker and writing splunk logs☆10Sep 30, 2019Updated 6 years ago
- ☆10Mar 6, 2026Updated 2 weeks ago
- ☆11Apr 2, 2022Updated 3 years ago
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆61Jul 24, 2023Updated 2 years ago
- A malware scanner with Yara and ClamAV binding☆12Apr 16, 2025Updated 11 months ago
- JObfuscator is a source code obfuscator for the Java language. Protect Java source code & algorithms from hacking, cracking, reverse engi…☆11Mar 11, 2023Updated 3 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago
- ☆55Sep 14, 2018Updated 7 years ago
- Some of CrackMes made by me :)☆18Dec 24, 2021Updated 4 years ago
- Meeting notes☆14Apr 5, 2016Updated 9 years ago
- CVE-2021-42342 RCE☆42Jan 4, 2022Updated 4 years ago
- 一些进程注入或者Shellcode注入的实例代码,用于练习和熟悉☆19May 29, 2022Updated 3 years ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Feb 8, 2023Updated 3 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Dec 11, 2022Updated 3 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆54Jun 19, 2016Updated 9 years ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- Latest muhstik release (4.2.2)☆10Mar 25, 2014Updated 12 years ago
- CC模拟器☆13Mar 21, 2017Updated 9 years ago
- Default project สำหรับงาน data science ที่รวมเอา library หลักๆ ที่ต้องใช้บน Python 3.11 ไว้ให้แล้วใน requirements.txt☆21Feb 6, 2024Updated 2 years ago
- DNS DDoS Defence and Countermeasure☆14Feb 17, 2016Updated 10 years ago
- ☆16Apr 28, 2022Updated 3 years ago
- Project HMS☆10Jun 11, 2018Updated 7 years ago
- A place to reborn☆61Nov 13, 2022Updated 3 years ago
- ☆14Aug 8, 2022Updated 3 years ago
- ☆11Nov 28, 2016Updated 9 years ago
- Instrumented ARM kernel☆15Oct 16, 2022Updated 3 years ago
- Collections of student projects to find execution path in binary program via taint analysis using Ghidra☆17Sep 25, 2022Updated 3 years ago
- Volatility 3 Plugins☆21Oct 3, 2022Updated 3 years ago
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆16Nov 7, 2022Updated 3 years ago
- The fuzzing framework named SHADOWFUZZER to find clientside vulnerabilities when processing incoming MQTT messages.☆20May 10, 2023Updated 2 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Dec 31, 2018Updated 7 years ago