Portable utility to check if a machine has been infected by Shamoon2
☆15Jan 13, 2017Updated 9 years ago
Alternatives and similar repositories for malcheck
Users that are interested in malcheck are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 10 years ago
- x86/64 Linux Debugger (written w/ python stdlib,ctypes/ptrace)☆10May 16, 2017Updated 9 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- A tool to leverage Virus Total's API key with advanced queries to download malware(s) and report(s).☆11Apr 24, 2013Updated 13 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Comae Hibernation File Decompressor☆157Apr 1, 2023Updated 3 years ago
- V1.0☆14Aug 8, 2016Updated 9 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- Volatility plugin to help identify DoublePulsar implant by listing the array of pointers SrvTransaction2DispatchTable from the srv.sys dr…☆16Aug 14, 2017Updated 8 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Oct 9, 2015Updated 10 years ago
- ☆12Apr 13, 2017Updated 9 years ago
- MIR-Engine☆24Jul 6, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Android Reverse Engineering Software belongs to ARE VM from the Honeynet Project☆56Feb 2, 2012Updated 14 years ago
- Extra modules for the Mercury Android Security Assessment Framework.☆24Jul 10, 2013Updated 12 years ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆23Aug 7, 2016Updated 9 years ago
- ☆52Sep 15, 2016Updated 9 years ago
- ☆12Sep 2, 2017Updated 8 years ago
- Usefull snippets / Computer-security oriented☆20Apr 20, 2017Updated 9 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- Carve Windows Prefetch files from arbitrary binary data☆16Jun 11, 2017Updated 8 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆19Jan 30, 2016Updated 10 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Bypassing User Account Control (UAC) using TpmInit.exe☆44Sep 26, 2016Updated 9 years ago
- A proof-of-concept IDE-style interface for Kaitai Struct☆17Oct 23, 2016Updated 9 years ago
- Shellcode injection using debugging APIs☆19Jan 13, 2014Updated 12 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- A project to learn about malware and c++ coding☆23Sep 5, 2015Updated 10 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Sep 17, 2025Updated 8 months ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 12 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- RC4 Encryption with CryptoAPI and C☆15Apr 6, 2016Updated 10 years ago
- A C# implementation of the PowerShell Empire Agent☆73Apr 22, 2019Updated 7 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- IDA AArch64 processor extender extension: Adding support for ARMv8.1 opcodes☆53Sep 11, 2017Updated 8 years ago
- ☆16Sep 7, 2017Updated 8 years ago
- Remote Code Execution exploit on TVT DVR☆63Apr 18, 2021Updated 5 years ago
- The Demo for CVE-2018-1000006☆39Jan 25, 2018Updated 8 years ago