☆13Oct 29, 2022Updated 3 years ago
Alternatives and similar repositories for smoke_conf_extract
Users that are interested in smoke_conf_extract are comparing it to the libraries listed below
Sorting:
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Updated this week
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- UnpacMe IDA Byte Search☆29Nov 20, 2023Updated 2 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆131Nov 25, 2023Updated 2 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- Code snips and notes☆140Mar 10, 2022Updated 3 years ago
- Go Lang Portable Executable Parser☆39Mar 31, 2021Updated 4 years ago
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- Tareas y plazos para los alumnos de 1º DAM del IES Campanillas del curso 2019/2020 en la asignatura de Programación.☆10Jun 1, 2020Updated 5 years ago
- Recreating and reviewing the Windows persistence methods☆39Nov 18, 2021Updated 4 years ago
- Crackmes Keygenmes Serialmes y más☆43Sep 11, 2022Updated 3 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Notes some analysis related to VidarStealer sample☆16May 5, 2024Updated last year
- ☆13Oct 10, 2018Updated 7 years ago
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Dec 4, 2019Updated 6 years ago
- An agent that performs user actions on a workstation☆12Jan 22, 2018Updated 8 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- Tool to decrypt encrypted strings in AgentTesla☆16Jan 24, 2022Updated 4 years ago
- Socks5man is a Socks5 management tool and Python library☆12Mar 10, 2023Updated 2 years ago
- Viruses for the public to test.☆10Aug 11, 2018Updated 7 years ago
- win32json Parser for TypeLibrary creation☆12Feb 10, 2022Updated 4 years ago
- Malware Configuration Extraction Modules☆51Nov 25, 2023Updated 2 years ago
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Sep 28, 2021Updated 4 years ago
- Binary template for ReFS and LogFile for 010 Editor that parses, and decodes the internal structures of ReFS metadata and log records☆17Apr 1, 2024Updated last year
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- fork from http://hashlib.codeplex.com☆12Oct 27, 2025Updated 4 months ago
- function identification signatures☆12Apr 26, 2021Updated 4 years ago
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- Una super pragmática selección de herramientas Javascript para distintos tipos de proyectos.☆10Aug 2, 2020Updated 5 years ago
- Educational Java Bot Virus☆10Mar 14, 2020Updated 5 years ago
- An IDA plugin to deobfuscate Pikabot's strings using RC4 and AES☆13Apr 8, 2024Updated last year
- An IDA Pro extension for easier (malware) reverse engineering☆116Aug 2, 2022Updated 3 years ago
- A small utility to deal with malware embedded hashes.☆53Sep 21, 2023Updated 2 years ago
- Tools and information about RingZer0CTF.com☆11Jul 21, 2023Updated 2 years ago
- Go library MalShare API☆13Apr 29, 2019Updated 6 years ago
- SLAE x86 from Pentester Academy☆14Nov 14, 2019Updated 6 years ago