mucoze / UmayLinks
IoT Malware Similarity Analysis Platform
☆45Updated 3 years ago
Alternatives and similar repositories for Umay
Users that are interested in Umay are comparing it to the libraries listed below
Sorting:
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆12Updated 2 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Updated 2 years ago
- My malware analysis code snippets☆28Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Updated 2 months ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- An injector that use PT_LOAD technique☆12Updated 3 years ago
- ☆26Updated 3 years ago
- Sources Codes of many Office Malwares☆17Updated 3 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆56Updated 3 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated last year
- ☆17Updated 2 years ago
- Simple WebSocket fuzzer☆32Updated 2 years ago
- Code snippets for Qiling Tutorials☆21Updated 5 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Updated last month
- Presentations from the CX Security Labs team☆35Updated 5 months ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 3 years ago
- Help deobfuscate VBScript☆18Updated 3 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- AMSI detection PoC☆31Updated 5 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated 2 years ago
- ProcDot Malware Sandbox☆26Updated 5 months ago
- ☆20Updated 5 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- A small utility to deal with malware embedded hashes.☆53Updated 2 years ago
- open source malware analysis and research notes dump☆26Updated 2 years ago
- Unpacking and decryption tools for the Emotet malware☆45Updated 4 years ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 3 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Updated 3 months ago