Code snippets for Qiling Tutorials
☆21Aug 22, 2020Updated 5 years ago
Alternatives and similar repositories for QilingForMalwareAnalysis
Users that are interested in QilingForMalwareAnalysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An IDA plugin to deobfuscate Pikabot's strings using RC4 and AES☆13Apr 8, 2024Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Feb 24, 2023Updated 3 years ago
- A small utility to deal with malware embedded hashes.☆53Sep 21, 2023Updated 2 years ago
- My malware analysis code snippets☆28Jul 15, 2023Updated 2 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Plugins for Scylla☆20Sep 14, 2011Updated 14 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Mar 2, 2021Updated 5 years ago
- Data EXfiltration TestER☆21Aug 28, 2019Updated 6 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆63Aug 21, 2024Updated last year
- function identification signatures☆12Apr 26, 2021Updated 4 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Ida Pro plugin to aid in reverse engineering Rust binaries.☆19Dec 9, 2024Updated last year
- the longene tech-docs for translation, to-be used in wiki: http://www.longene.org/mediawiki/index.php/%E9%A6%96%E9%A1%B5☆13Jan 4, 2011Updated 15 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Apr 10, 2022Updated 3 years ago
- Malware dynamic instrumentation tool based on frida framework☆110Jun 7, 2020Updated 5 years ago
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆39Apr 27, 2025Updated 10 months ago
- ☆13Nov 24, 2021Updated 4 years ago
- Index of my personal projects and writing, functionally a CV☆21Mar 11, 2026Updated 2 weeks ago
- ☆39Dec 10, 2024Updated last year
- Reports in .MD format☆21Jul 8, 2025Updated 8 months ago
- ☆19Aug 6, 2021Updated 4 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Aug 1, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆30Jul 18, 2025Updated 8 months ago
- ☆45Feb 26, 2024Updated 2 years ago
- Fork of Synacktiv's private Lumina server☆21Feb 22, 2022Updated 4 years ago
- Flare-On solutions☆37Oct 11, 2019Updated 6 years ago
- A simple IDA Pro plugin to show all HexRays decompiler comments written by user☆23Sep 3, 2021Updated 4 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Jun 27, 2019Updated 6 years ago
- An IDA plugin that uses language models to speed up binary analysis.☆45Nov 23, 2025Updated 4 months ago
- Writeups/exploit code for CTFs I've done☆13Aug 29, 2021Updated 4 years ago
- Unpacking and decryption tools for the Emotet malware☆44Dec 5, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- indent guides plugin for hex-rays decompiler☆81Mar 10, 2026Updated 2 weeks ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Apr 14, 2023Updated 2 years ago
- Hacker Disassembler Engine - mirro☆26Jul 13, 2022Updated 3 years ago
- Các IDA Flirt signatures HTC tạo☆20Oct 21, 2024Updated last year
- Network Scanner with Backdoor Detection, other Nmap resources and syn-protection detection☆32Jul 31, 2023Updated 2 years ago
- ☆23May 24, 2024Updated last year
- ☆13Oct 29, 2022Updated 3 years ago