Cross Platform Malware Development Framework
☆68Nov 3, 2015Updated 10 years ago
Alternatives and similar repositories for graviton
Users that are interested in graviton are comparing it to the libraries listed below
Sorting:
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- a MITM attack tool☆85Sep 9, 2015Updated 10 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Windows Malware☆39Apr 17, 2013Updated 12 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆191Dec 19, 2015Updated 10 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- Shellcode injection using debugging APIs☆19Jan 13, 2014Updated 12 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Open source tool that uses censys and shodan for passive recon.☆13May 20, 2016Updated 9 years ago
- A project to learn about malware and c++ coding☆23Sep 5, 2015Updated 10 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175May 6, 2016Updated 9 years ago
- Android based APT exploitation framework☆36Jul 20, 2015Updated 10 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 9 years ago
- Bit9 + Carbon Black Threat Intelligence☆81Mar 9, 2016Updated 10 years ago
- ☆45Jun 16, 2017Updated 8 years ago
- Bootkits Revisited☆39Jun 3, 2014Updated 11 years ago
- ☆228May 17, 2016Updated 9 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- map file generator for intel x86 binary based on flirt signature☆83May 2, 2016Updated 9 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Sep 15, 2015Updated 10 years ago
- A collection of offensive tools I've hacked together for CTFs and such☆20Aug 9, 2016Updated 9 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51May 3, 2016Updated 9 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- Malware diversity☆51Dec 2, 2015Updated 10 years ago
- Windows Software Exploitation☆136Feb 14, 2017Updated 9 years ago
- Windows PowerShell domain scanning tool☆54Apr 23, 2016Updated 9 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆91Jul 27, 2016Updated 9 years ago
- Analysis PE file or Shellcode☆50Jul 28, 2016Updated 9 years ago
- Poison Ivy Appendix/Extras☆18Aug 21, 2013Updated 12 years ago
- malware source codes☆571Dec 16, 2022Updated 3 years ago
- Sublime Malware Research Tool☆66Oct 28, 2024Updated last year
- Ponmocup Indicators of Compromise☆11Feb 4, 2016Updated 10 years ago
- Malware Behavior Analyzer☆158Jun 1, 2017Updated 8 years ago
- Removes Google Analytics-related utm_ parameters from displayed URLs☆29May 2, 2016Updated 9 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆382Apr 17, 2017Updated 8 years ago
- Пример руткита для ядра линукс 5☆19Dec 4, 2020Updated 5 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago