mucoze / UmayLinks
IoT Malware Similarity Analysis Platform
☆45Updated 3 years ago
Alternatives and similar repositories for Umay
Users that are interested in Umay are comparing it to the libraries listed below
Sorting:
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆12Updated 2 years ago
- Sources Codes of many Office Malwares☆17Updated 3 years ago
- ☆26Updated 3 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 3 years ago
- Linux startup analyzer☆65Updated 6 months ago
- An injector that use PT_LOAD technique☆12Updated 3 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆29Updated 3 weeks ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated 11 months ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 3 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- ☆17Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- ☆23Updated 2 years ago
- Help deobfuscate VBScript☆17Updated 3 years ago
- AMSI detection PoC☆31Updated 5 years ago
- A small utility to deal with malware embedded hashes.☆52Updated 2 years ago
- Code snippets for Qiling Tutorials☆21Updated 5 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago
- My malware analysis code snippets☆28Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Updated last month
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆19Updated 5 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 3 years ago
- Tricard - Malware Sandbox Fingerprinting☆22Updated 2 years ago
- ProcDot Malware Sandbox☆25Updated 4 months ago
- WIP Post-exploitation framework tailored for hypervisors.☆51Updated 2 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- ☆12Updated 2 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago