mucoze / UmayLinks
IoT Malware Similarity Analysis Platform
☆45Updated 3 years ago
Alternatives and similar repositories for Umay
Users that are interested in Umay are comparing it to the libraries listed below
Sorting:
- Sources Codes of many Office Malwares☆17Updated 3 years ago
- My malware analysis code snippets☆28Updated 2 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆12Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 3 years ago
- ☆26Updated 3 years ago
- A small utility to deal with malware embedded hashes.☆52Updated 2 years ago
- ☆17Updated 2 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated 11 months ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Updated 4 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Updated last month
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Updated last month
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆106Updated 6 months ago
- Tricard - Malware Sandbox Fingerprinting☆23Updated 2 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- ☆20Updated 5 years ago
- An injector that use PT_LOAD technique☆12Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 3 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 3 years ago
- AMSI detection PoC☆31Updated 5 years ago
- open source malware analysis and research notes dump☆26Updated 2 years ago
- Code snippets for Qiling Tutorials☆21Updated 5 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- Help deobfuscate VBScript☆17Updated 3 years ago
- Simple WebSocket fuzzer☆32Updated 2 years ago
- android-inject-hook☆16Updated 7 years ago
- ☆12Updated 2 years ago