mucoze / Umay
IoT Malware Similarity Analysis Platform
☆44Updated 2 years ago
Related projects: ⓘ
- ☆27Updated this week
- ☆17Updated this week
- MUSHIKAGO-femto is an automated penetration testing and first aid tool☆15Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- ☆19Updated this week
- ☆12Updated 2 years ago
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆12Updated last year
- ☆22Updated 2 years ago
- Exactly what it sounds like, which is something rad☆20Updated last year
- ☆21Updated this week
- Tricard - Malware Sandbox Fingerprinting☆19Updated 9 months ago
- My nim learning experiments☆11Updated 2 years ago
- ☆16Updated last year
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 2 years ago
- An injector that use PT_LOAD technique☆12Updated last year
- Malware campaigns and APTs research by BlackArrow☆17Updated 4 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated last year
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆12Updated last year
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service and versions.☆15Updated 4 months ago
- Sources Codes of many Office Malwares☆15Updated 2 years ago
- ☆16Updated 6 months ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆8Updated 8 years ago
- Shell hunter for AF☆34Updated 2 years ago
- ☆17Updated last year
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 3 years ago
- ☆20Updated this week
- ☆21Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Updated 2 years ago