☆50Apr 10, 2016Updated 9 years ago
Alternatives and similar repositories for packer-malware
Users that are interested in packer-malware are comparing it to the libraries listed below
Sorting:
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- Ponmocup Indicators of Compromise☆11Feb 4, 2016Updated 10 years ago
- A toy Linux rootkit.☆13May 10, 2013Updated 12 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- Malware analyses and helpful scripts☆29May 26, 2022Updated 3 years ago
- lkm rootkit☆15May 12, 2014Updated 11 years ago
- Create custom Windows batch files from a configuration file☆32Oct 29, 2016Updated 9 years ago
- ☆15Mar 24, 2016Updated 9 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Feb 1, 2026Updated 3 weeks ago
- A novel rootkit under linux(test under cents 5.4) combine with preload_inject and sys_table modify☆19Nov 2, 2013Updated 12 years ago
- Modified edition of cuckoo community modules☆50May 12, 2017Updated 8 years ago
- Sandbox d'analyse de malware pour Windows 7 avec un client TCP en mode noyau☆19Feb 23, 2016Updated 10 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- SlyPI☆20Jun 13, 2013Updated 12 years ago
- 🐧 A simple kernel-level rootkit☆21Mar 1, 2016Updated 9 years ago
- An experimental rootkit for Android☆26Feb 22, 2013Updated 13 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Windows PE file debugger☆11Aug 30, 2017Updated 8 years ago
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 14 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Jul 13, 2016Updated 9 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Mar 20, 2015Updated 10 years ago
- A Unix rootkit☆17Aug 9, 2020Updated 5 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- LD_PRELOAD rootkit☆24Oct 12, 2014Updated 11 years ago
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- This is a very simple Keylogger, it doesn't hide itself and is a college project building towards developing a rootkit.☆23Apr 14, 2014Updated 11 years ago
- Utility tool to help digitally sign applications (binaries) on Windows.☆13Jun 8, 2015Updated 10 years ago
- Framework patches for OpenPDroid permission management☆39Mar 8, 2014Updated 11 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- analyze the content of the pe file on windows, and shell(pack) function for windows drivers.☆11Nov 9, 2018Updated 7 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago