☆82Jul 23, 2019Updated 6 years ago
Alternatives and similar repositories for wscript
Users that are interested in wscript are comparing it to the libraries listed below
Sorting:
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Dec 20, 2019Updated 6 years ago
- Tool for dropping malware from EK☆40Feb 9, 2018Updated 8 years ago
- ☆48Nov 28, 2016Updated 9 years ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆476Jun 16, 2023Updated 2 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- Gobbling it's way through your pcap files☆24Oct 23, 2014Updated 11 years ago
- rVMI - A New Paradigm For Full System Analysis☆359Oct 4, 2017Updated 8 years ago
- Frida.re based RunPE (and MapViewOfSection) extraction tool☆114Mar 2, 2017Updated 9 years ago
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- ☆11May 19, 2017Updated 8 years ago
- Comparison table of VMX capabilities for a bunch of processors☆13Nov 3, 2020Updated 5 years ago
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated last month
- ☆17Aug 20, 2014Updated 11 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 8 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Mar 22, 2017Updated 8 years ago
- BASS - BASS Automated Signature Synthesizer☆179Sep 19, 2018Updated 7 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- Watching the Flag☆15Dec 16, 2015Updated 10 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- ☆108Mar 21, 2017Updated 8 years ago
- My CTF writeup☆26Mar 20, 2017Updated 8 years ago
- Script analysis tool based on Frida.re☆131May 31, 2017Updated 8 years ago
- specific fuzzers based on AFL and fuzzing results☆41Oct 22, 2016Updated 9 years ago
- ☆64Oct 24, 2015Updated 10 years ago
- Anti-Honeypot Demo (obsolete)☆18Jul 24, 2017Updated 8 years ago
- A project that uses Binary Ninja and GRAKN.AI to perform static analysis on binary files with the goal of identifying bugs in software.☆35Feb 5, 2018Updated 8 years ago
- A reference Device Guard code integrity policy consisting of FilePublisher deny rules for published Device Guard configuration bypasses☆114May 27, 2017Updated 8 years ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,682Feb 14, 2024Updated 2 years ago
- ☆28Feb 13, 2017Updated 9 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Sep 15, 2015Updated 10 years ago
- libemu shim layer and win32 environment for Unicorn Engine☆73Apr 14, 2017Updated 8 years ago
- Various snippets created during malware analysis☆464Oct 3, 2025Updated 4 months ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago
- Toolkit for enriching and speeding up static malware analysis☆168Jan 28, 2022Updated 4 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 10 years ago
- Python script to decode common encoded PowerShell scripts☆217Jun 13, 2018Updated 7 years ago