General malware analysis stuff
☆37Aug 26, 2024Updated last year
Alternatives and similar repositories for malware-research
Users that are interested in malware-research are comparing it to the libraries listed below
Sorting:
- ☆12Jan 18, 2026Updated last month
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆43Dec 17, 2024Updated last year
- ☆29Nov 14, 2022Updated 3 years ago
- ☆22Sep 25, 2023Updated 2 years ago
- Resources from Trend Micro Research teams☆26Nov 14, 2024Updated last year
- A command line Windows API tracing tool for Golang binaries.☆159Dec 4, 2023Updated 2 years ago
- ☆27Nov 26, 2024Updated last year
- Files related to works published in Black Mass☆10Sep 16, 2023Updated 2 years ago
- run 68000 elf, Motorola hex, and CP/M 68K binaries on Windows, macOS, and Linux☆19Updated this week
- Develop macOS apps on Windows with seamless cross-platform tools.☆16Jun 5, 2025Updated 9 months ago
- Exploit development challenges!☆24Mar 19, 2023Updated 2 years ago
- An x64dbg plugin which helps make sense of long C++ symbols☆59May 12, 2023Updated 2 years ago
- Chrome Logs Events and Protobuf Parser☆39Dec 13, 2022Updated 3 years ago
- Plugin which enables chai scripts to run inside of x64dbg☆12Jul 10, 2016Updated 9 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- ☆18Jun 25, 2024Updated last year
- Multiplatform CLI and GUI tool to show information about ELF files☆63Jul 1, 2025Updated 8 months ago
- Static Decryptor for IcedID Malware☆18Oct 1, 2022Updated 3 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- UCL is a portable lossless data compression library written in ANSI C. See http://www.oberhumer.com/opensource/ucl☆15Jun 12, 2012Updated 13 years ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- extract and parse WEVT_TEMPLATEs from PE files☆18Dec 30, 2023Updated 2 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year
- ☆17Apr 18, 2023Updated 2 years ago
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆37Mar 15, 2023Updated 2 years ago
- ☆138Apr 20, 2023Updated 2 years ago
- Simple shellcode injection in Nim encrypted in XOR☆22Aug 21, 2023Updated 2 years ago
- A virustotal command line script to scan/analyze suspicious files and url's.☆18May 24, 2024Updated last year
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- Tools and scripts to deploy and manage OpenRelik instances☆16Updated this week
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 3 months ago
- Helper scripts to automate the extraction of YARA rules from XProtectRemediators☆22Mar 5, 2024Updated last year
- Collection of scripts to automate the Malware Analysis process☆33Oct 27, 2025Updated 4 months ago
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- Debugger and analyzer for ARM ELF executables.☆18Oct 24, 2022Updated 3 years ago
- Attack chain emulator. Write recipes for initial access easily☆23Feb 26, 2025Updated last year
- IFL - Interactive Functions List (plugin for Binary Ninja)☆25Jul 9, 2024Updated last year
- Plugin for x64Dbg adding Lua scripting.☆21May 3, 2019Updated 6 years ago
- Graphical interface for PortEx, a Portable Executable and Malware Analysis Library☆144Jun 22, 2025Updated 8 months ago