Malware vulnerability research. Coming soon..
☆12Apr 20, 2020Updated 5 years ago
Alternatives and similar repositories for MalwareVulnerabilitiesExposures
Users that are interested in MalwareVulnerabilitiesExposures are comparing it to the libraries listed below
Sorting:
- ☆14Apr 29, 2020Updated 5 years ago
- Liberating dem proprietary APT implants☆20Dec 17, 2019Updated 6 years ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- Kernel mode windows NT API logger☆22Sep 9, 2019Updated 6 years ago
- Basic multi platform meterpreter loader module.☆16Jul 21, 2020Updated 5 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- ¯\_(ツ)_/¯☆30Dec 16, 2019Updated 6 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆75Mar 7, 2021Updated 5 years ago
- Kill Switch Script - stops traffic leaking from you if your VPN goes down.☆13Sep 20, 2016Updated 9 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- A PowerShell binding for the Unicorn Engine☆17Dec 27, 2015Updated 10 years ago
- Meetuplardan arta kalanlar☆42Aug 18, 2025Updated 7 months ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Jun 19, 2014Updated 11 years ago
- ☆13Sep 21, 2017Updated 8 years ago
- api-tracer is a tiny (useless) tracer☆17Feb 28, 2023Updated 3 years ago
- AutoIt Analysis Library: Parser & Emulator For Malware Researchers☆21Apr 27, 2019Updated 6 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- Linux ortamına ait Anti-Analiz teknikleri uygulaması.☆10Aug 6, 2017Updated 8 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- ☆23Jan 22, 2017Updated 9 years ago
- ☆29May 1, 2020Updated 5 years ago
- 虚拟机带外内存监控☆14Mar 30, 2018Updated 7 years ago
- A kernel mode Windows rootkit in development.☆49Dec 31, 2021Updated 4 years ago
- APT34/OILRIG leak☆232Apr 17, 2019Updated 6 years ago
- The exploit for Panda AV LPE☆37May 22, 2019Updated 6 years ago
- Experimental: MLX model provider for Strands Agents - Build, train, and deploy AI agents on Apple Silicon.☆36Mar 14, 2026Updated last week
- Provides a way which you can load a .NET dll/exe from disk, modify/inject IL, and then run the assembly all in memory without modifying t…☆29Mar 31, 2017Updated 8 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- Winsock accept() Backdoor Implant.☆118Feb 13, 2021Updated 5 years ago
- AMSI Bypass Via the Heap☆107Nov 20, 2020Updated 5 years ago
- Reversing and reimplementing "powercfg /requests" using Native API☆30Jul 25, 2024Updated last year
- Various scripts for different malware families☆106Apr 12, 2021Updated 4 years ago
- X86_64 Assembly'a merhaba deyin!☆44Aug 17, 2019Updated 6 years ago
- a sandbox project by sudami☆17Jul 31, 2018Updated 7 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- ☆27Feb 6, 2022Updated 4 years ago