Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.
☆132Oct 30, 2013Updated 12 years ago
Alternatives and similar repositories for recomposer
Users that are interested in recomposer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Get email notification when Virus Total has a copy of your binary.☆168Jul 2, 2020Updated 5 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆16Aug 10, 2016Updated 9 years ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆104Feb 6, 2018Updated 8 years ago
- ☆25May 9, 2021Updated 4 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆399May 20, 2016Updated 9 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Aug 5, 2013Updated 12 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- Smart DLL execution for malware analysis in sandbox systems☆144Feb 16, 2015Updated 11 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- A Tool for Automatic Analysis of Malware Behavior☆373May 8, 2019Updated 6 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Aug 4, 2020Updated 5 years ago
- An Open Source Malware Analysis Pipeline System☆157Jun 1, 2021Updated 4 years ago
- Frida.re based RunPE (and MapViewOfSection) extraction tool☆114Mar 2, 2017Updated 9 years ago
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Nov 4, 2017Updated 8 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- bitshred research project code.☆14Feb 12, 2016Updated 10 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/malware-lu☆57May 21, 2019Updated 6 years ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Sep 23, 2014Updated 11 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Jul 12, 2016Updated 9 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 9 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- Modified edition of cuckoo☆272Sep 9, 2019Updated 6 years ago
- Ragpicker is a Plugin based malware crawler with pre-analysis and reporting functionalities. Use this tool if you are testing antivirus p…☆94Aug 7, 2015Updated 10 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Aug 3, 2016Updated 9 years ago
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 8 months ago
- A Tool to Unpack Self-Modifying Code using DynamoRIO☆140Apr 17, 2017Updated 8 years ago