A tool to download malwares
☆16May 22, 2023Updated 2 years ago
Alternatives and similar repositories for hg
Users that are interested in hg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- Parses Java Cache IDX files☆40Feb 28, 2018Updated 8 years ago
- A collection of offensive tools I've hacked together for CTFs and such☆20Aug 9, 2016Updated 9 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- Poison Ivy Appendix/Extras☆18Aug 21, 2013Updated 12 years ago
- Texture Atlas Generator is a pipeline tool for generating texture atlases, atlas data files and image fonts for use in apps and games.☆19Jul 22, 2013Updated 12 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆91Sep 13, 2015Updated 10 years ago
- Ponmocup Indicators of Compromise☆11Feb 4, 2016Updated 10 years ago
- Detect malicious domain, Blablablablabla☆27Jan 8, 2017Updated 9 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Jni++ : Thread-safe and type-safe C++11 wrap for Android JNI.☆12Jul 25, 2017Updated 8 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Python courseware leveraging Flask and OpenShift☆12Aug 18, 2016Updated 9 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Malware monitor template based on MinHook☆17Mar 29, 2015Updated 10 years ago
- External Module for ITK, implementing Isotropic Wavelets and Riesz Filter for multiscale phase analysis.☆14Nov 12, 2025Updated 4 months ago
- C++ intrusive container templates. Abstract node links, no use of new/delete.☆10Mar 5, 2026Updated 2 weeks ago
- 010 Editor Template for parsing VMware Disk(vmdk) images☆16Sep 12, 2018Updated 7 years ago
- Simple Windows application that spawns a LÖVE instance with the game folder supplied as a commandline argument, and makes it the wallpape…☆13Jul 25, 2016Updated 9 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Jun 19, 2014Updated 11 years ago
- An LTE EPS simulation☆12Sep 30, 2013Updated 12 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated 11 months ago
- Analysis related to article on FOIA Online Database.☆11Feb 2, 2017Updated 9 years ago
- Locker Decrypter - Python tool to decrypt files encrypted by Locker malware☆19Jun 8, 2015Updated 10 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Vagrant files for a Ganeti tutorial and/or Ganeti testing environment☆28Feb 28, 2014Updated 12 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Oct 11, 2020Updated 5 years ago
- Python OpenIOC Editor☆18Dec 28, 2015Updated 10 years ago
- Ansible role to manage omdistro and check_mk☆10Jun 30, 2017Updated 8 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆77Oct 29, 2014Updated 11 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- The Elsa Programming Language☆17Apr 2, 2017Updated 8 years ago