☆48Apr 1, 2020Updated 5 years ago
Alternatives and similar repositories for packerid
Users that are interested in packerid are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- ☆15Feb 28, 2020Updated 6 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- A framework for analysis, stimulation, and detection of Android repackaged malware (under construction)☆11Apr 18, 2018Updated 7 years ago
- Disassembler Library for x86 and x86-64☆15Apr 7, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A scalable framework for binary analysis in a containered environment.☆13May 20, 2019Updated 6 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- ☆16Jan 14, 2016Updated 10 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- Passive DNS collection (and statistics) from RIPE Atlas Sensors☆19Apr 23, 2017Updated 8 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Identify botnet panels with Ensembled Decision Trees☆18Aug 3, 2016Updated 9 years ago
- PE rebuilder, based on yoda's realigndll☆12Oct 1, 2011Updated 14 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- A(nother) Binary Analysis Framework☆30Jun 10, 2014Updated 11 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- threat language parser☆59Apr 20, 2015Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- LD_PRELOAD rootkit utils☆16Jul 3, 2015Updated 10 years ago
- Honeypot for router backdoor (TCP 32764)☆19Feb 6, 2014Updated 12 years ago
- Bootkits Revisited☆39Jun 3, 2014Updated 11 years ago
- Platform for Browser Exploitation☆34Mar 1, 2015Updated 11 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago
- Headless Scripts for Ghidra's Headless Analyzer written in Python☆33Sep 21, 2019Updated 6 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Plugins for Scylla☆20Sep 14, 2011Updated 14 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- Local Kernel Debugger (LKD) is a python wrapper around dbgengine.dll☆92Aug 22, 2016Updated 9 years ago
- ☆21Jan 24, 2016Updated 10 years ago
- Automatic Yara Rule Generation☆333Feb 2, 2016Updated 10 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Feb 5, 2016Updated 10 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago