Ursnif beacon decryptor
☆27Mar 20, 2023Updated 3 years ago
Alternatives and similar repositories for ursnif_beacon_decryptor
Users that are interested in ursnif_beacon_decryptor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- List of tools to assist in analyzing samples of ISFB/Gozi/Ursnif☆15Jul 17, 2019Updated 6 years ago
- ☆16Mar 20, 2026Updated 3 weeks ago
- A Lightweight Malware Configuration Parsing Tool☆15Nov 6, 2019Updated 6 years ago
- ☆83Jan 31, 2020Updated 6 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- collection of links related to using and improving windbg☆20Jun 17, 2018Updated 7 years ago
- Tools for assisting the reverse engineering of Qakbot☆11Jul 21, 2021Updated 4 years ago
- This repository provides tools to fight against Emotet malware. You can protect your system using these tools☆24Jan 24, 2020Updated 6 years ago
- TA505 unpacker Python 2.7☆46Jun 22, 2020Updated 5 years ago
- Hfinger - fingerprinting HTTP requests☆142May 16, 2023Updated 2 years ago
- ☆23Feb 3, 2021Updated 5 years ago
- FW1-Loggrabber is a command-line tool to grab logfiles from remote Checkpoint devices using OPSEC LEA (Log Export API)☆53Jul 1, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- ☆32Jun 19, 2024Updated last year
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- Dynamic Identification and Recognition Technology☆10Nov 1, 2016Updated 9 years ago
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- Static based decoders for malware samples☆94Jul 27, 2020Updated 5 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature☆17Jan 7, 2017Updated 9 years ago
- Collection of generic YARA rules☆16Mar 18, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆136Jan 24, 2019Updated 7 years ago
- Compressed Rich Text Format (RTF) compression and decompression in Python☆24Jun 29, 2025Updated 9 months ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- An IDA Plugin that help analyzing module that use COM☆232Oct 10, 2025Updated 6 months ago
- Various scripts for different malware families☆106Apr 12, 2021Updated 5 years ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Dec 14, 2018Updated 7 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- This is a python version of samesame repo to generate homograph strings☆24Aug 22, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- catch log4j exploits in the wild? maybe if we're lucky... .☆16Aug 14, 2023Updated 2 years ago
- ☆29May 10, 2020Updated 5 years ago
- Honeynet Project Static Site☆20Feb 16, 2026Updated last month
- Automatically exported from code.google.com/p/windbgshark☆11Jul 1, 2015Updated 10 years ago
- This project aims at simplifying Windows API import recovery on arbitrary memory dumps☆263Mar 27, 2023Updated 3 years ago
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago