Portable utility to check if a machine has been infected by Shamoon2
☆15Jan 13, 2017Updated 9 years ago
Alternatives and similar repositories for malcheck
Users that are interested in malcheck are comparing it to the libraries listed below
Sorting:
- x86/64 Linux Debugger (written w/ python stdlib,ctypes/ptrace)☆10May 16, 2017Updated 8 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Oct 9, 2015Updated 10 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- MIR-Engine☆23Jul 6, 2017Updated 8 years ago
- Android Reverse Engineering Software belongs to ARE VM from the Honeynet Project☆56Feb 2, 2012Updated 14 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- A project to learn about malware and c++ coding☆23Sep 5, 2015Updated 10 years ago
- Miscellanous scripts used for malware analysis☆23Oct 4, 2018Updated 7 years ago
- Pascal interpreter for Android.☆23Sep 16, 2010Updated 15 years ago
- ☆12Apr 13, 2017Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Comae Hibernation File Decompressor☆156Apr 1, 2023Updated 2 years ago
- ☆12Sep 2, 2017Updated 8 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- Shellcode injection using debugging APIs☆19Jan 13, 2014Updated 12 years ago
- Plugin which enables chai scripts to run inside of x64dbg☆12Jul 10, 2016Updated 9 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 9 years ago
- ☆52Sep 15, 2016Updated 9 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Apr 29, 2018Updated 7 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Feb 23, 2017Updated 9 years ago
- IDA AArch64 processor extender extension: Adding support for ARMv8.1 opcodes☆53Sep 11, 2017Updated 8 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago
- A tool for analyzing code coverage and path coverage without using xdebug.☆23Sep 13, 2012Updated 13 years ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Jun 2, 2020Updated 5 years ago
- ☆16Sep 7, 2017Updated 8 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Oct 11, 2017Updated 8 years ago
- RC4 Encryption with CryptoAPI and C☆15Apr 6, 2016Updated 9 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆28Apr 2, 2016Updated 9 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- ☆14Aug 15, 2018Updated 7 years ago
- Scanner for Regin Virtual Filesystems☆25Jan 20, 2015Updated 11 years ago
- OpenSSH 7.7 - Username Enumeration☆17Oct 23, 2020Updated 5 years ago
- The Demo for CVE-2018-1000006☆40Jan 25, 2018Updated 8 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago