A small utility to deal with malware embedded hashes.
☆53Sep 21, 2023Updated 2 years ago
Alternatives and similar repositories for Uchihash
Users that are interested in Uchihash are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malware dynamic instrumentation tool based on frida framework☆111Jun 7, 2020Updated 5 years ago
- A lightweight type converter python library.☆13Oct 1, 2020Updated 5 years ago
- Writeups for the challenges i wrote for ASCWG quals☆10Aug 8, 2022Updated 3 years ago
- Code snippets for Qiling Tutorials☆21Aug 22, 2020Updated 5 years ago
- ☆14May 9, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆27Jul 18, 2024Updated last year
- An IDA plugin to deobfuscate Pikabot's strings using RC4 and AES☆13Apr 8, 2024Updated 2 years ago
- Convenience routines for working with the Unicorn emulator in Python☆31Feb 2, 2025Updated last year
- ☆23Aug 1, 2020Updated 5 years ago
- a collection of Advanced Malwares and APT tools for geek analysts to play with☆43Oct 21, 2021Updated 4 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- ☆76Nov 30, 2023Updated 2 years ago
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- PyDelta is a Python script designed to obfuscate Python source code, making it more difficult to understand and reverse-engineer.☆13Jul 13, 2024Updated last year
- Hanoman is an GUI antivirus engine sigature based detection 🐒☆47Oct 3, 2021Updated 4 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- SLAE x86 from Pentester Academy☆14Nov 14, 2019Updated 6 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Oct 20, 2018Updated 7 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- Nexus Repository Manager3 - 远程执行代码漏洞回显payload☆13Sep 29, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆19Aug 6, 2021Updated 4 years ago
- ☆10Jul 5, 2020Updated 5 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- ☆15Nov 4, 2020Updated 5 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆132Nov 25, 2023Updated 2 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆108Mar 8, 2023Updated 3 years ago
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- Sources Codes of many Office Malwares☆18Sep 4, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- powershell tool for VM evasion☆41Oct 2, 2020Updated 5 years ago
- Frida example to trace VBA CreateObject calls and some string deobfuscations calls. You need latest Frida 12.9.8 for improved symbol look…☆25Sep 3, 2020Updated 5 years ago
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- a tool to deobfuscate, unminify, and simplify JavaScript code.☆53Dec 17, 2025Updated 4 months ago
- Redteam, Pentest, APT's, Blogs, Talks, Slides links and notes☆27May 25, 2022Updated 3 years ago
- Rust symbol recovery tool☆82Feb 19, 2026Updated 2 months ago
- 从zoomeye or shodan or file 获取目标进行攻击。☆17Nov 21, 2019Updated 6 years ago