lclevy / unarcryptoLinks
unarcrypto is an educational tool to depict cryptography usage in zip, rar and 7zip archives
☆97Updated 7 years ago
Alternatives and similar repositories for unarcrypto
Users that are interested in unarcrypto are comparing it to the libraries listed below
Sorting:
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- POLAR☆74Updated 6 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 8 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 10 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Updated 9 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆143Updated 5 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 9 years ago
- ripPE - section extractor and profiler for PE file analysis☆32Updated 11 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 8 years ago
- Insiderer looks inside files for metadata and hidden content☆37Updated 10 years ago
- A boot record parser that identifies known good signatures for MBR, VBR and IPL.☆96Updated 9 months ago
- Volatility plugin to extract FileVault 2 VMK's☆51Updated 4 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- a collection of yara rules for binary analysis☆24Updated 8 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆51Updated 7 years ago
- Password scrambler - a deterministic password re-generator (alternative to a password manager)☆131Updated 2 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Updated 5 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 7 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 8 years ago
- Cryptowall Tooling & Information☆37Updated 9 years ago
- Tool to make in memory man in the middle☆125Updated 7 years ago
- library to decode/parse zeus-like configuration files☆30Updated 7 years ago
- Automatically exported from code.google.com/p/malware-lu☆56Updated 6 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 5 years ago
- The Alternative Fileless File System☆57Updated 6 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago