精心制作的恶意软件分析工具和资源列表A curated list of awesome malware analysis tools and resources
☆43Dec 28, 2017Updated 8 years ago
Alternatives and similar repositories for MalwareAnalysis
Users that are interested in MalwareAnalysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 恶意软件原理图☆60Mar 29, 2021Updated 5 years ago
- https://github.com/rshipp/awesome-malware-analysis☆35Oct 1, 2020Updated 5 years ago
- Haxmas-2017 LD_PRELOAD rootkit in Golang☆19Dec 28, 2017Updated 8 years ago
- Muteces (mutexes/mutants) used by various malware families☆23Nov 11, 2024Updated last year
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- pwn☆12Apr 7, 2019Updated 7 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 4 years ago
- A tool to run a command when the target of a symlink changes☆16Apr 28, 2016Updated 9 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- 威胁情报,恶意样本分析,开源Malware代码收集☆350Nov 1, 2019Updated 6 years ago
- 此拓展在JumpServer的基础上拓展了Ansible的集成,可在JumpServer管理的资产下执行Ansible PlayBook。☆33Jul 9, 2018Updated 7 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 4 years ago
- 针对《解密家用路由器0day漏洞挖掘技术》一书的相关笔记☆16Oct 12, 2020Updated 5 years ago
- ☆11Oct 28, 2016Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆19Jul 29, 2022Updated 3 years ago
- 🐌 Nginx日志分析处理监控☆53Nov 15, 2021Updated 4 years ago
- 潮涌web漏洞自动化挖掘平台——自动化扫描全网或特定范围web资产,之后获取指纹信息、爬取页面url并提炼,最后进行特定payload测试。☆50May 9, 2020Updated 5 years ago
- Simple protector to show how to run a payload without dropping it using RunPE Technique☆35Jul 3, 2017Updated 8 years ago
- With the exception of GUI GDI, there are basic examples of almost all Windows features to help you understand all the basic apis of Windo…☆12Nov 7, 2022Updated 3 years ago
- Sources code extracted from malwares for analysis☆40Mar 10, 2023Updated 3 years ago
- this is Crytolocket Malware Domain Generation Algorithm (DGA). Cryptolocker uses DGA to generate 1000 to 10000 unique domain names for it…☆14Sep 5, 2016Updated 9 years ago
- A library to parse, modify, and implement Malleable C2 profiles☆27Feb 9, 2019Updated 7 years ago
- Windows Malware Probe of Concept☆21Jun 20, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A repository contains all sort of cheat-sheets for various things.☆11Sep 24, 2021Updated 4 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 4 years ago
- RedTeam参考,修改自Ridter的https://github.com/Ridter/Intranet_Penetration_Tips☆89Sep 16, 2021Updated 4 years ago
- 各种漏洞poc、Exp的收集或编写☆32Jun 24, 2016Updated 9 years ago
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- Collection of penetration testing tools☆82Dec 17, 2020Updated 5 years ago
- A pyhon script to do port scan via weblogic uuid☆10Oct 1, 2020Updated 5 years ago
- A ray tracer based on nori and mitsuba. (Used only for learning)☆12May 30, 2020Updated 5 years ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆23Jul 11, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Simple socket-based gateway to the Burp Collaborator☆34Nov 23, 2016Updated 9 years ago
- 该资源为《软件安全》课程实验及工具,包括PE文件解析、数字签名解析、恶意软件分析、CVE漏洞复现等。希望对您有所帮助~☆79May 21, 2021Updated 4 years ago
- Fast, indexed regexp search over large file trees☆23Dec 5, 2019Updated 6 years ago
- Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.☆71Oct 10, 2016Updated 9 years ago
- 一款强大的内网信息收集工具,支持文件、文件夹、文件内容、命令、注册表、进程、mimikatz命令、dpapi、最近访问收集,且支持定制化配置,只需更新配置文件,定义收集规则,即可开启对各类浏览器、remote工具、聊天软件进行凭据、信息收集☆22Oct 16, 2022Updated 3 years ago
- check_IP is to judge whether a IP is malicious based on open threat intelligence,基于开源威胁情报AlienVault,排查IP地址及域名的恶意性☆53Aug 9, 2018Updated 7 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Feb 24, 2023Updated 3 years ago