Analysis Reports of Malwares
☆14Jun 21, 2019Updated 6 years ago
Alternatives and similar repositories for Malware-Analysis-Reports
Users that are interested in Malware-Analysis-Reports are comparing it to the libraries listed below
Sorting:
- My Malware Analysis Reports☆25May 24, 2022Updated 3 years ago
- Automate generation of syzkaller's grammar☆16Nov 1, 2022Updated 3 years ago
- Python module for demangling rust function names☆19Apr 24, 2021Updated 4 years ago
- The Reverse Engineering Assistant of your dreams☆31Dec 30, 2021Updated 4 years ago
- Documentation, U-Boot and OpenWRT ports for a low-cost MT02 repeater.☆15Oct 27, 2025Updated 4 months ago
- KitsuneC2 is a cross-platform adversary emulation tool written in Go.☆12Oct 25, 2024Updated last year
- Kernel Playground - A playground to run large scale experiments on the Linux Kernel☆17Nov 8, 2025Updated 4 months ago
- Cryptanalysis of a proprietary 1999 video DRM system. Recovers 61 encrypted wrestling videos from the WCW Internet Powerdisk CD-ROM throu…☆25Jan 29, 2026Updated last month
- FileSigExtractor is a python based tool which extracts the file signatures of all files within a directory and writes the output to a CSV…☆10Jul 15, 2023Updated 2 years ago
- "Porting Syzkaller to ReactOS" GSoC 2020 Project by @freakston☆14Aug 4, 2020Updated 5 years ago
- Minimalistic port-spoofer written in Python☆11Jan 9, 2025Updated last year
- ☆13Aug 28, 2018Updated 7 years ago
- All in one - Malware + Analysis by Cylance☆11Nov 23, 2018Updated 7 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- ☆15Oct 1, 2024Updated last year
- Minimal ELF inspector written in C for quick binary layout inspection☆29Jan 9, 2026Updated 2 months ago
- Phone Radar is a simple tool that allows you to scan mobile phone numbers and display the provider tied to the number, can be usefull to …☆14Dec 13, 2024Updated last year
- IoC Feed for security analysts etc.☆13Feb 1, 2023Updated 3 years ago
- Galago extracts encryption keys from ARM64 Android native libraries through controlled emulation.☆24Jan 23, 2026Updated last month
- A tool that acts as an assistant for Reverse Engineering challenges in CTFs☆16Jan 5, 2021Updated 5 years ago
- Flutter App for Pujo Atlas☆12Oct 5, 2024Updated last year
- PowerShell Script for AD Security Assessment☆17Jul 18, 2023Updated 2 years ago
- Some python scripts to do tasks☆10Apr 26, 2021Updated 4 years ago
- 基于环信即时通信云V2 SDK开发的聊天demo☆13Oct 8, 2016Updated 9 years ago
- Simple and fast HTTP logs analyzer (Apache/Nginx) for huge log files☆18Jan 22, 2014Updated 12 years ago
- Kiwi PN532 SPI library for Arduino☆15Feb 2, 2026Updated last month
- ☆18May 31, 2022Updated 3 years ago
- Vulnerability and exploit testing for a mobile game☆25Nov 8, 2024Updated last year
- Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Crystal, Python and Rust☆57Jan 27, 2026Updated last month
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Aug 19, 2025Updated 6 months ago
- A lightweight type converter python library.☆13Oct 1, 2020Updated 5 years ago
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆16Apr 30, 2021Updated 4 years ago
- A revival of the classic and legendary KsDumper☆39Nov 19, 2025Updated 3 months ago
- A Security Operations playbook to assist blue teamers from day-to-day tasks to Digital Forensics and Incident Response (DFIR) activities.☆22Updated this week
- ☆17May 7, 2019Updated 6 years ago
- List of learning resources, learning platforms, and tools useful for CTF and cybersecurity in general☆20Jan 19, 2022Updated 4 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 8 years ago
- Collection and Roadmap for everyone who wants DevSecOps, contains list of tools and methodologies☆19Jul 3, 2022Updated 3 years ago
- ☆18Aug 4, 2022Updated 3 years ago