theo-abel / awesome-anti-virtualization
A curated list of awesome resources related to anti virtualization techniques
☆16Updated last month
Alternatives and similar repositories for awesome-anti-virtualization:
Users that are interested in awesome-anti-virtualization are comparing it to the libraries listed below
- ☆86Updated last month
- A feed of malware samples curated from threat intelligence sources.☆25Updated last year
- Custom Binary Ninja Themes☆12Updated last year
- ☆27Updated 4 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated 3 weeks ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆52Updated last month
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated 10 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆52Updated 3 months ago
- Solutions and writeups for the Flare-On 11 (2024) reverse engineering challenge☆63Updated 3 months ago
- yet another hidden LKM hunter☆19Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆14Updated 3 months ago
- examples of using radius2 to solve reversing challenges☆34Updated 2 months ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆52Updated 2 months ago
- In-Memory Rootkit For Linux☆70Updated last month
- Resolve symbols from release rust binaries on Windows☆20Updated last year
- Proof-of-concept modular implant platform leveraging v8☆50Updated 3 weeks ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆31Updated 3 months ago
- ☆39Updated last year
- Tools for offensive security of NetBackup infrastructures☆39Updated last year
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆62Updated 2 weeks ago
- Hardened your Windows OS against forensics analysis☆20Updated 4 months ago
- Scripts to help and speed up reversing activities☆10Updated 3 months ago
- Web interface to explore Suricata EVE outputs☆50Updated 3 months ago
- DEbian Cve REproducer Tool☆22Updated last year
- Binary Golf Grand Prix☆53Updated 2 weeks ago
- Script to chain search parameters for MalwareBazaar☆10Updated 2 months ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆18Updated 3 months ago
- ☆28Updated 2 months ago
- Configuration Extractor for BlackCat Ransomware☆30Updated 3 years ago
- ☆147Updated last year