Portable utility to check if a machine has been infected by Shamoon2
☆15Jan 13, 2017Updated 9 years ago
Alternatives and similar repositories for malcheck
Users that are interested in malcheck are comparing it to the libraries listed below
Sorting:
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- x86/64 Linux Debugger (written w/ python stdlib,ctypes/ptrace)☆10May 16, 2017Updated 8 years ago
- API Tools☆27Apr 18, 2016Updated 9 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- A tool to leverage Virus Total's API key with advanced queries to download malware(s) and report(s).☆11Apr 24, 2013Updated 12 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- Comae Hibernation File Decompressor☆156Apr 1, 2023Updated 2 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- V1.0☆14Aug 8, 2016Updated 9 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- Volatility plugin to help identify DoublePulsar implant by listing the array of pointers SrvTransaction2DispatchTable from the srv.sys dr…☆16Aug 14, 2017Updated 8 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Oct 9, 2015Updated 10 years ago
- ☆12Apr 13, 2017Updated 8 years ago
- MIR-Engine☆23Jul 6, 2017Updated 8 years ago
- Android Reverse Engineering Software belongs to ARE VM from the Honeynet Project☆56Feb 2, 2012Updated 14 years ago
- Extra modules for the Mercury Android Security Assessment Framework.☆24Jul 10, 2013Updated 12 years ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆23Aug 7, 2016Updated 9 years ago
- ☆52Sep 15, 2016Updated 9 years ago
- ☆12Sep 2, 2017Updated 8 years ago
- Usefull snippets / Computer-security oriented☆20Apr 20, 2017Updated 8 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- Carve Windows Prefetch files from arbitrary binary data☆16Jun 11, 2017Updated 8 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆44Sep 26, 2016Updated 9 years ago
- A proof-of-concept IDE-style interface for Kaitai Struct☆17Oct 23, 2016Updated 9 years ago
- Shellcode injection using debugging APIs☆19Jan 13, 2014Updated 12 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- A project to learn about malware and c++ coding☆23Sep 5, 2015Updated 10 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Sep 17, 2025Updated 6 months ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago
- RC4 Encryption with CryptoAPI and C☆15Apr 6, 2016Updated 9 years ago
- A C# implementation of the PowerShell Empire Agent☆74Apr 22, 2019Updated 6 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- IDA AArch64 processor extender extension: Adding support for ARMv8.1 opcodes☆53Sep 11, 2017Updated 8 years ago
- ☆16Sep 7, 2017Updated 8 years ago
- Remote Code Execution exploit on TVT DVR☆62Apr 18, 2021Updated 4 years ago