Static based decoders for malware samples
☆94Jul 27, 2020Updated 5 years ago
Alternatives and similar repositories for malware_decoders
Users that are interested in malware_decoders are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆23Aug 1, 2020Updated 5 years ago
- Smart overlay for Cobalt Strike PS function☆30Mar 9, 2019Updated 7 years ago
- My collection of unpackers for malware packers/crypters☆28Aug 24, 2017Updated 8 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆448Oct 26, 2022Updated 3 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Aug 17, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Toolset for research malware and Cobalt Strike beacons☆211Mar 11, 2025Updated last year
- ☆45Aug 16, 2018Updated 7 years ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 3 years ago
- CobaltStrike External C2 for Websockets☆196Jul 16, 2019Updated 6 years ago
- DoHC2 allows the ExternalC2 library from Ryan Hanson (https://github.com/ryhanson/ExternalC2) to be leveraged for command and control (C2…☆448Aug 7, 2020Updated 5 years ago
- 🔵 Ethereum and BNB (BSC) Mev bot - Arbitrage☆365Mar 4, 2026Updated 2 months ago
- Various scripts for different malware families☆106Apr 12, 2021Updated 5 years ago
- ☆1,136Dec 19, 2023Updated 2 years ago
- ☆18Apr 4, 2019Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆12Jun 29, 2021Updated 4 years ago
- c2 traffic☆196Feb 6, 2023Updated 3 years ago
- For all these times you're asking yourself "what is this panel again?"☆262Jan 29, 2026Updated 3 months ago
- Volatility plugin for extracts configuration data of known malware☆496Dec 22, 2023Updated 2 years ago
- Cobalt Strike Aggressor extension for Visual Studio Code☆138Jun 20, 2024Updated last year
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆183Oct 5, 2020Updated 5 years ago
- ☆13Jul 11, 2017Updated 8 years ago
- Kernel Cache Decryption for iOS☆16Nov 16, 2021Updated 4 years ago
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Python3 Metasploit automation library☆24Dec 8, 2022Updated 3 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- ☆83Jan 31, 2020Updated 6 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆43Oct 30, 2019Updated 6 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆514Aug 6, 2019Updated 6 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Oct 13, 2022Updated 3 years ago
- ☆136Jan 24, 2019Updated 7 years ago
- An IDA Plugin that help analyzing module that use COM☆232Oct 10, 2025Updated 7 months ago
- Automated library compilation and PDB annotation with CMake and IDA Pro☆22Sep 20, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆169Jan 5, 2021Updated 5 years ago
- APT34/OILRIG leak☆232Apr 17, 2019Updated 7 years ago
- Bypass cobaltstrike beacon config scan☆85May 24, 2021Updated 4 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Jun 11, 2020Updated 5 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- various methods of making API calls☆19Feb 1, 2025Updated last year
- ☆451Aug 4, 2021Updated 4 years ago