lclevy / unarcrypto
unarcrypto is an educational tool to depict cryptography usage in zip, rar and 7zip archives
☆97Updated 6 years ago
Alternatives and similar repositories for unarcrypto
Users that are interested in unarcrypto are comparing it to the libraries listed below
Sorting:
- Binary file entropy visualizer written in Python☆54Updated 3 months ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- POLAR☆73Updated 6 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆142Updated 5 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆84Updated 4 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Updated 8 years ago
- The Alternative Fileless File System☆57Updated 6 years ago
- swffile.py - SWF file parser module in Python☆28Updated 9 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Updated 4 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 7 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆171Updated 6 years ago
- Python Application to Reverse Freezing☆36Updated 8 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- ☆102Updated 5 years ago
- Automatically exported from code.google.com/p/malware-lu☆55Updated 5 years ago
- All related files and slides for past talks☆44Updated 2 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆99Updated 5 years ago
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 3 years ago
- Use Markov Chains to obfuscate data as other data☆53Updated 8 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 8 years ago
- Radare 2 wiki☆92Updated 5 years ago
- Format string exploitation helper☆45Updated 9 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆21Updated 7 years ago
- Personal repository for all ctf related stuffs☆67Updated 6 months ago