saasthavasan / Malware-Analysis-ReportsView external linksLinks
Analysis Reports of Malwares
☆14Jun 21, 2019Updated 6 years ago
Alternatives and similar repositories for Malware-Analysis-Reports
Users that are interested in Malware-Analysis-Reports are comparing it to the libraries listed below
Sorting:
- My Malware Analysis Reports☆25May 24, 2022Updated 3 years ago
- Automate generation of syzkaller's grammar☆16Nov 1, 2022Updated 3 years ago
- Python module for demangling rust function names☆19Apr 24, 2021Updated 4 years ago
- The Reverse Engineering Assistant of your dreams☆31Dec 30, 2021Updated 4 years ago
- Kernel Playground - A playground to run large scale experiments on the Linux Kernel☆17Nov 8, 2025Updated 3 months ago
- PCB design for the initial prototype of OBC hardware, to interface with LaunchPad.☆10Sep 19, 2018Updated 7 years ago
- FileSigExtractor is a python based tool which extracts the file signatures of all files within a directory and writes the output to a CSV…☆10Jul 15, 2023Updated 2 years ago
- idaflirt-detector is Python scripts and IDA FLIRT signatures to detect statically linked libraries from stripped ELF file.☆11May 19, 2022Updated 3 years ago
- "Porting Syzkaller to ReactOS" GSoC 2020 Project by @freakston☆14Aug 4, 2020Updated 5 years ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 6 months ago
- Minimalistic port-spoofer written in Python☆11Jan 9, 2025Updated last year
- ☆13Aug 28, 2018Updated 7 years ago
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆36Jan 27, 2026Updated 2 weeks ago
- Minimal ELF inspector written in C for quick binary layout inspection☆29Jan 9, 2026Updated last month
- Red Team Coin for crypto-mining operations.☆23Jan 12, 2026Updated last month
- Galago extracts encryption keys from ARM64 Android native libraries through controlled emulation.☆23Jan 23, 2026Updated 3 weeks ago
- ☆15Oct 1, 2024Updated last year
- IoC Feed for security analysts etc.☆13Feb 1, 2023Updated 3 years ago
- All in one - Malware + Analysis by Cylance☆11Nov 23, 2018Updated 7 years ago
- Documentation about ReaQta DeStra® Engine☆11Feb 7, 2022Updated 4 years ago
- 🌳 Link in bio, hacker style.☆12Jan 12, 2026Updated last month
- Flutter App for Pujo Atlas☆12Oct 5, 2024Updated last year
- A tool that acts as an assistant for Reverse Engineering challenges in CTFs☆16Jan 5, 2021Updated 5 years ago
- Kiwi PN532 SPI library for Arduino☆16Feb 2, 2026Updated last week
- 基于环信即时通信云V2 SDK开发的聊天demo☆13Oct 8, 2016Updated 9 years ago
- Simple and fast HTTP logs analyzer (Apache/Nginx) for huge log files☆18Jan 22, 2014Updated 12 years ago
- Deep and Dark Web OSINT Tool☆10Sep 18, 2018Updated 7 years ago
- Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Python, Rust and Crystal☆52Jan 27, 2026Updated 2 weeks ago
- Vulnerability and exploit testing for a mobile game☆25Nov 8, 2024Updated last year
- A revival of the classic and legendary KsDumper☆35Nov 19, 2025Updated 2 months ago
- Hermes Proxy - HTTP Traffic Analyzer☆50Updated this week
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Aug 19, 2025Updated 5 months ago
- demo of an attack & defense CTF☆16Jun 4, 2018Updated 7 years ago
- ☆17May 7, 2019Updated 6 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 8 years ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Feb 8, 2023Updated 3 years ago
- List of learning resources, learning platforms, and tools useful for CTF and cybersecurity in general☆20Jan 19, 2022Updated 4 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152