Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the ones setup for malware analysis).
☆15Jan 28, 2023Updated 3 years ago
Alternatives and similar repositories for emofishes
Users that are interested in emofishes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Python script to patch the reflective stub in a DLL☆24Apr 9, 2017Updated 8 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- A CTF VM that fights back☆19Apr 4, 2012Updated 13 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆12Aug 16, 2013Updated 12 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 10 years ago
- Talk given at DerbyCon and RuxCon 2016☆23Sep 23, 2016Updated 9 years ago
- search and collect windows files from multiple locations on machine and store in one centralized directory☆20Aug 29, 2012Updated 13 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Wordpress Two-factor Authentication Brute-forcer☆19Oct 22, 2019Updated 6 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- This python based milter (mail-filter) checks an incoming mail for suspicious VBA macro code in MS 20xx Office attachments (doc, xls, ppt…☆39Mar 29, 2021Updated 4 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- Python libraries for Windows system coding☆15May 13, 2020Updated 5 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Jun 22, 2015Updated 10 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- Go bindings for yara: pattern matching swiss knife http://plusvic.github.io/yara/☆10Jul 21, 2015Updated 10 years ago
- Tool to view and create Microsoft shim database files (SDB).☆119May 11, 2017Updated 8 years ago
- Yet another no-frills low-interaction ssh honeypot in Go.☆16Feb 2, 2020Updated 6 years ago
- vstruct based dissectors for various file/protocol formats☆15Jul 27, 2017Updated 8 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- botnet frontend i wrote in a night and then improved over a few other nights☆13Apr 11, 2019Updated 6 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Aug 10, 2014Updated 11 years ago
- Password guessers for popular vulnerability scanners and frameworks: Find the password for your favourite vulnscanners: OpenVAS, Nessus, …☆30Nov 8, 2012Updated 13 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Aug 12, 2015Updated 10 years ago
- Linux-KVM with rVMI extensions☆22Aug 28, 2017Updated 8 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Sep 12, 2014Updated 11 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 9 years ago
- A simple C library for entropy measurement of byte streams and other data.☆14Dec 9, 2019Updated 6 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Ring3 Rootkit Backdoor.☆42Jul 20, 2015Updated 10 years ago
- Collection of modified open fuzzer.☆30Jun 9, 2012Updated 13 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated 11 months ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- misc pentest tools.☆26Dec 16, 2014Updated 11 years ago