uppusaikiran / malware-organiserLinks
A simple tool to organise large malicious/benign files into a organised Structure.
☆1Updated 6 years ago
Alternatives and similar repositories for malware-organiser
Users that are interested in malware-organiser are comparing it to the libraries listed below
Sorting:
- Writeups of some of PicoCTF 2017 challenges.☆10Updated 6 years ago
- A Single Library Parser to extract meta information,static analysis and detect macros within the files.☆1Updated 6 years ago
- ☆10Updated 7 years ago
- ☆9Updated 9 years ago
- Set of useful scrpts☆10Updated 10 years ago
- API Tracker by Cysinfo Team☆22Updated 8 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- ☆20Updated 4 years ago
- Removal of certain event logs within a Windows OS☆8Updated 5 years ago
- Windows login backdoor diagnostic tool☆11Updated 8 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- Work in Progress repo☆14Updated 6 years ago
- ☆22Updated 4 years ago
- various slides and presentations I've worked on☆19Updated 3 months ago
- C & Shellcode Playground..☆11Updated 7 years ago
- Network detector for Winnti malware☆20Updated 7 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 5 years ago
- Various snippets created during malware analysis☆22Updated 7 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- ☆1Updated 6 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Updated 8 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- API functions for Malware Research☆35Updated 5 years ago
- Simple tool to find the yara matches on a file☆1Updated 6 years ago
- Mimikatz HashClash☆12Updated 10 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- ☆23Updated 4 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago