PyCommand Scripts for Immunity Debugger
☆37Jun 21, 2014Updated 11 years ago
Alternatives and similar repositories for pycommands
Users that are interested in pycommands are comparing it to the libraries listed below
Sorting:
- Poison Ivy Appendix/Extras☆18Aug 21, 2013Updated 12 years ago
- A composite score for one's GitHub quality.☆22May 1, 2022Updated 3 years ago
- ☆85Apr 10, 2023Updated 2 years ago
- Bro integration with osquery☆15Mar 24, 2023Updated 2 years ago
- bunch of random stuff☆21Apr 11, 2020Updated 5 years ago
- ☆82Jul 5, 2016Updated 9 years ago
- Our CTF to celebrate our hackers approaching $50M in bounty earnings!☆15Mar 25, 2023Updated 2 years ago
- Very hard chess testset☆15Oct 22, 2016Updated 9 years ago
- general purpose and malware specific analysis tools☆101Oct 22, 2015Updated 10 years ago
- Command-line and Python debugger for instrumenting and modifying native software behavior on Windows and Linux.☆164Apr 10, 2023Updated 2 years ago
- ☆23Jan 4, 2017Updated 9 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆149Oct 5, 2017Updated 8 years ago
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 9 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- Plugin for binary ninja to centralize features useful in static analysis.☆15Mar 3, 2020Updated 6 years ago
- Automatic VLAN configuration tool for Linux☆25Jan 24, 2019Updated 7 years ago
- libemu shim layer and win32 environment for Unicorn Engine☆73Apr 14, 2017Updated 8 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- Convert RT tickets to JIRA tickets☆17Mar 9, 2015Updated 11 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35May 7, 2015Updated 10 years ago
- Hack It Framework☆28Jul 14, 2018Updated 7 years ago
- A tool to cluster similar executables (PEs, DEXs, and etc), extract common signature, and generate Yara patterns for malware detection.☆26Jan 5, 2019Updated 7 years ago
- okl4 git for porting to realview_eb RTSM platform☆15Oct 17, 2012Updated 13 years ago
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Mar 14, 2014Updated 12 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Jul 11, 2015Updated 10 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆91Feb 14, 2019Updated 7 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Jun 18, 2019Updated 6 years ago
- ☆44Feb 27, 2017Updated 9 years ago
- ☆14May 22, 2024Updated last year
- Obfuscate specific windows apis with different apis☆12Jul 31, 2024Updated last year
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- Using Windows Hook to make a CLI WebShellKill☆45Feb 4, 2019Updated 7 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- ☆14Jan 3, 2020Updated 6 years ago
- Dynamic malware analysis for the Android platform☆40Sep 26, 2014Updated 11 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- LANGZI_SRC_安全巡航 是一款集成漏扫,验证,资产监控,自动复现并且生成结果表报的工具,实现初衷是为了帮助白帽子 在SRC中节约时间成本的自动化工具。☆14Jul 7, 2019Updated 6 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆49May 1, 2022Updated 3 years ago