☆45Aug 16, 2018Updated 7 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆43Nov 5, 2018Updated 7 years ago
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 9 years ago
- ☆32Jun 19, 2024Updated last year
- Static based decoders for malware samples☆94Jul 27, 2020Updated 5 years ago
- SMTP server / sinkhole for collecting spam☆46Jul 30, 2018Updated 7 years ago
- Stana - A strace output parser and analyser☆32Aug 21, 2018Updated 7 years ago
- Your bag of handy codes for malware researchers☆120Mar 20, 2020Updated 6 years ago
- CmdDesktopSwitch is a small utility that lists all windows desktops and provides the option to switch between them. This can be used to i…☆35May 27, 2016Updated 9 years ago
- SSDT_process_hide_protect☆10Jul 17, 2014Updated 11 years ago
- 恶意代码分析学习笔记☆10Dec 29, 2015Updated 10 years ago
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/malware-lu☆57May 21, 2019Updated 6 years ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- CAPE core and community parsers☆18Feb 9, 2026Updated last month
- Various snippets created during malware analysis☆464Oct 3, 2025Updated 5 months ago
- ☆38Jul 7, 2017Updated 8 years ago
- ☆14Feb 19, 2021Updated 5 years ago
- ☆16Dec 5, 2023Updated 2 years ago
- Various scripts for different malware families☆106Apr 12, 2021Updated 4 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- Cryptowall Tooling & Information☆37Mar 3, 2016Updated 10 years ago
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆21Mar 30, 2018Updated 7 years ago
- Various config files obtained during malware analysis☆67Oct 31, 2018Updated 7 years ago
- N-Name, lightweight dotNet DLL Obfuscator☆20Jun 4, 2023Updated 2 years ago
- ☆100Jun 19, 2024Updated last year
- UnpacMe IDA Byte Search☆29Nov 20, 2023Updated 2 years ago
- Create Suricata and Snort DNS signatures given a single domain or list of domains in a file.☆18Nov 13, 2017Updated 8 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Jun 26, 2016Updated 9 years ago
- ☆28Apr 18, 2016Updated 9 years ago
- ☆45Jun 16, 2017Updated 8 years ago
- A collection of anti disassembly techniques☆20Jul 22, 2017Updated 8 years ago
- idb2pat plugin, fixed to work with IDA 6.2☆23Oct 8, 2011Updated 14 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Scanner for Regin Virtual Filesystems☆25Jan 20, 2015Updated 11 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43May 18, 2017Updated 8 years ago
- Go bindings for YARA☆18Mar 10, 2022Updated 4 years ago
- Cowrie Honeypot Obscurer☆18Oct 14, 2020Updated 5 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Jan 8, 2019Updated 7 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Dec 14, 2018Updated 7 years ago