mucoze / Umay
IoT Malware Similarity Analysis Platform
☆44Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Umay
- ☆12Updated 2 years ago
- Code snippets for Qiling Tutorials☆20Updated 4 years ago
- An injector that use PT_LOAD technique☆11Updated last year
- Publishing advisories for CVEs found by POST Cyberforce☆12Updated 4 months ago
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆12Updated last year
- A collection of beautified and commented samples of malware implemented in Bash☆10Updated last year
- Exactly what it sounds like, which is something rad☆20Updated 2 years ago
- Sources Codes of many Office Malwares☆16Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Updated 2 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆14Updated last year
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 3 years ago
- ☆16Updated last year
- My nim learning experiments☆11Updated 2 years ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆16Updated 2 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆9Updated 3 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆20Updated 3 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- A collection of various exploits☆25Updated 2 months ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated last year