myrtus0x0 / smoke_conf_extractView external linksLinks
☆13Oct 29, 2022Updated 3 years ago
Alternatives and similar repositories for smoke_conf_extract
Users that are interested in smoke_conf_extract are comparing it to the libraries listed below
Sorting:
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated 3 weeks ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- UnpacMe IDA Byte Search☆29Nov 20, 2023Updated 2 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆130Nov 25, 2023Updated 2 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- Code snips and notes☆140Mar 10, 2022Updated 3 years ago
- Go Lang Portable Executable Parser☆39Mar 31, 2021Updated 4 years ago
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- Tareas y plazos para los alumnos de 1º DAM del IES Campanillas del curso 2019/2020 en la asignatura de Programación.☆10Jun 1, 2020Updated 5 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- Recreating and reviewing the Windows persistence methods☆39Nov 18, 2021Updated 4 years ago
- Crackmes Keygenmes Serialmes y más☆43Sep 11, 2022Updated 3 years ago
- ☆13Oct 10, 2018Updated 7 years ago
- ☆25Jun 27, 2025Updated 7 months ago
- win32json Parser for TypeLibrary creation☆12Feb 10, 2022Updated 4 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Tool to decrypt encrypted strings in AgentTesla☆16Jan 24, 2022Updated 4 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- An agent that performs user actions on a workstation☆12Jan 22, 2018Updated 8 years ago
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Dec 4, 2019Updated 6 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- Viruses for the public to test.☆10Aug 11, 2018Updated 7 years ago
- Socks5man is a Socks5 management tool and Python library☆12Mar 10, 2023Updated 2 years ago
- Notes some analysis related to VidarStealer sample☆17May 5, 2024Updated last year
- bad stuffs by bad guys☆49Jul 28, 2022Updated 3 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Apr 10, 2024Updated last year
- Malware Configuration Extraction Modules☆51Nov 25, 2023Updated 2 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Una super pragmática selección de herramientas Javascript para distintos tipos de proyectos.☆10Aug 2, 2020Updated 5 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- Binary template for ReFS and LogFile for 010 Editor that parses, and decodes the internal structures of ReFS metadata and log records☆17Apr 1, 2024Updated last year
- Educational Java Bot Virus☆10Mar 14, 2020Updated 5 years ago
- RWX CTF Team Writeups☆10Dec 24, 2019Updated 6 years ago
- IDAPython scripts☆15Aug 24, 2017Updated 8 years ago
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- function identification signatures☆12Apr 26, 2021Updated 4 years ago