tillmannw / prowlerLinks
Base Code for P2P Network Crawlers
☆31Updated 12 years ago
Alternatives and similar repositories for prowler
Users that are interested in prowler are comparing it to the libraries listed below
Sorting:
- library to decode/parse zeus-like configuration files☆30Updated 7 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Updated 9 years ago
- ☆68Updated 8 years ago
- A tool to retrieve malware directly from the source for security researchers.☆39Updated 8 years ago
- Simple shellcode decoder using unicorn-engine☆100Updated 10 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 9 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Updated 8 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 8 years ago
- Volatility Plugins☆22Updated 10 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Updated 5 years ago
- Linux kernel modules developed by me for learning purposes☆19Updated 13 years ago
- Yet another Python library to read and write PE/PE+ files.☆78Updated 9 years ago
- ripPE - section extractor and profiler for PE file analysis☆33Updated 11 years ago
- Set of python scripts to analyse PE32/PE64 binaries and to extract VB 5/6 headers and Visual Basic p-code functions.☆49Updated 10 years ago
- Automatically compiled list of file hashes associated with the IoT malware Hajime and its components.☆14Updated 7 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆48Updated 9 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- Your bag of handy codes for malware researchers☆120Updated 5 years ago
- ☆137Updated 4 years ago
- POLAR☆74Updated 6 years ago
- yara rules for crypto detection☆31Updated 11 years ago
- zer0m0n driver for cuckoo sandbox☆24Updated 10 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Updated 10 years ago
- ☆44Updated 7 years ago
- Binary Analysis Platform☆74Updated 12 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆75Updated 9 years ago
- Some source code snippets In my development.☆26Updated 3 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 7 years ago
- Linux rootkit and detection examples☆32Updated 10 years ago