neriberto / hgLinks
A tool to download malwares
☆16Updated 2 years ago
Alternatives and similar repositories for hg
Users that are interested in hg are comparing it to the libraries listed below
Sorting:
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Updated 9 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- ☆16Updated 10 years ago
- A tool to generate yara signatures from function blocks☆19Updated 10 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- Volatility Plugins☆21Updated 10 years ago
- a collection of public yara rules☆26Updated 5 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Various Malware-Related Utilities☆10Updated 8 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆9Updated 9 years ago
- ☆19Updated 6 years ago
- ASERT shared scripts for reversing☆32Updated 7 years ago
- Malware analysis tool☆22Updated last month
- Command-line Interface for Binar.ly☆37Updated 8 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- Automation for VirusTotal☆31Updated 9 years ago
- Network Forensics Workshop Files☆17Updated 10 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- Volatility Plugin to scan for shimmed processes in Windows☆10Updated 9 years ago
- Tools to work with vulnerability standards.☆19Updated 11 years ago
- a collection of yara rules for binary analysis☆24Updated 7 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Updated 2 years ago
- Useful scripts, rules etc. for use with YARA☆27Updated 4 years ago
- Tools☆13Updated 2 years ago