m-dwyer / packer-malwareLinks
☆50Updated 9 years ago
Alternatives and similar repositories for packer-malware
Users that are interested in packer-malware are comparing it to the libraries listed below
Sorting:
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 7 years ago
- A warehouse for your malware☆134Updated 12 years ago
- ☆16Updated 10 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆26Updated 9 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆106Updated 5 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Updated 8 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆39Updated 10 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 9 years ago
- ☆46Updated 8 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 11 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Static and automated/dynamic malware analysis☆47Updated 9 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 10 years ago
- Volatility Plugins☆21Updated 10 years ago
- Torified Cuckoo malware analyser in a Docker container with VirtualBox☆2Updated 8 years ago
- Because I can't find scripts to do this anywhere else...☆25Updated 8 years ago
- ☆53Updated 10 years ago
- Yara intergrated into BurpSuite☆48Updated 9 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- Automated memory forensics analysis☆33Updated 5 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 8 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago