Agentic malware analysis environment with MCP-connected disassemblers, RE tooling, and structured workflows for Claude Code and Codex CLI.
☆204Mar 22, 2026Updated last month
Alternatives and similar repositories for agentic-malware-analysis
Users that are interested in agentic-malware-analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generate Go bindings for shared C libraries.☆18Jul 13, 2024Updated last year
- All PWN-oriented (X-DEV/RE) CTFs from http://CTFTIME.org (organized in an excel sheet) 2016-2022 CTFs☆11Nov 21, 2022Updated 3 years ago
- Basic utility to tell SpLdr to start and stop SpSys on Vista (and 7.)☆11Feb 25, 2025Updated last year
- ☆27Mar 11, 2026Updated 2 months ago
- ida utilities / plugins / scripts☆100Jan 29, 2026Updated 3 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Linux kernel and browser exploit scripts for ctf challenges☆15Apr 24, 2025Updated last year
- IDA Taskr is a pure Python library for IDA Pro related parallel computing. It lets you use the power of Qt (built-in to IDA!) and Python'…☆29Feb 3, 2026Updated 3 months ago
- Brovan is a user-mode x86_64 binary emulator for PE, ELF, memory dumps, and unrecognized file formats.☆81Updated this week
- A simple example how to decrypt kernel debugger data block☆32Feb 8, 2021Updated 5 years ago
- ☆15Jun 12, 2015Updated 10 years ago
- A tiny educational decompiler that helps people understand how decompilation works.☆218Updated this week
- Exploit scripts for ctf challenges that involves linux kernel pwning☆18Dec 10, 2024Updated last year
- ☆11Jun 24, 2024Updated last year
- Monitor ETW events for Windows process mitigation policies, with stack traces☆30Oct 7, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Crystal Palace library for proxying Nt API calls via the Threadpool. Updated for call gadgets.☆20Nov 11, 2025Updated 6 months ago
- Assisting Go Analysis and Reversing☆100Nov 13, 2025Updated 6 months ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- Async Python library to parse local and remote disk images.☆84Jul 11, 2025Updated 10 months ago
- Try to transport the tcpip stack of ReactOS to Windows XP.☆17Feb 27, 2014Updated 12 years ago
- ☆17Sep 25, 2024Updated last year
- Proof-of-concept post-build obfuscator for Unity IL2CPP projects☆39Jan 12, 2025Updated last year
- Script for making bootable Windows USB drives and raw images for dd☆12Nov 16, 2024Updated last year
- poc for cve-2025-53772☆47Dec 10, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 7 years ago
- WinEoP Exploitation Framework☆25Jan 7, 2016Updated 10 years ago
- My research environment based off of Microsoft's Singularity RDK/ Verve.☆16Nov 27, 2016Updated 9 years ago
- A bunch of architectural headers for i386 and AMD64☆42Oct 7, 2023Updated 2 years ago
- Stealth-focused Intel VT-x hypervisor (EAC/BE/ACs/AVs).☆319Mar 20, 2026Updated 2 months ago
- 参考taviso的代码逆向一下mpengine.dll☆20Jun 30, 2022Updated 3 years ago
- An x64dbg plugin which marks XFG call signatures as data☆81May 12, 2023Updated 3 years ago
- Windows kernel driver that detects hypervisors by probing SIDT/LIDT edge cases, paging/TLB behaviors, privilege transitions, and timing e…☆44Mar 3, 2026Updated 2 months ago
- ☆21Jun 9, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆129Dec 23, 2025Updated 4 months ago
- Polymorphic PE rewriter for Windows x64 , rewrites binaries into semantically identical but byte-different variants☆160May 9, 2026Updated last week
- 自己封装好用于项目的公共基础类☆12Mar 23, 2023Updated 3 years ago
- ☆30Oct 13, 2025Updated 7 months ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆45Sep 15, 2022Updated 3 years ago
- Rustで作成されたバイナリのリバースエンジニアリング調査レポート☆65Dec 1, 2025Updated 5 months ago