lclevy / unarcryptoLinks
unarcrypto is an educational tool to depict cryptography usage in zip, rar and 7zip archives
☆97Updated 6 years ago
Alternatives and similar repositories for unarcrypto
Users that are interested in unarcrypto are comparing it to the libraries listed below
Sorting:
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Basic command line, text-based, shellcode debugger.☆91Updated 8 years ago
- POLAR☆73Updated 6 years ago
- Insiderer looks inside files for metadata and hidden content☆37Updated 10 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Updated 9 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 6 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆51Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Memory inspection REPL interface☆45Updated 7 years ago
- Miscellaneous Tools☆38Updated 10 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆21Updated 7 years ago
- Format string exploitation helper☆45Updated 9 years ago
- Code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"☆27Updated 6 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 8 years ago
- r2yara - Module for Yara using radare2 information☆36Updated last year
- Password scrambler - a deterministic password re-generator (alternative to a password manager)☆131Updated 2 years ago
- Python Application to Reverse Freezing☆36Updated 9 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Updated 8 years ago
- ☆44Updated 8 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 7 years ago
- Google Chrome internals analysis using Volatility☆42Updated 2 years ago
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 4 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆143Updated 5 years ago
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 9 years ago
- Framework for static and dynamic analysis in Android APKs☆32Updated 8 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago