zautomata / virusshareLinks
☆14Updated 7 years ago
Alternatives and similar repositories for virusshare
Users that are interested in virusshare are comparing it to the libraries listed below
Sorting:
- ☆22Updated 4 years ago
- Rekall Memory Forensic Framework☆32Updated 5 years ago
- Zerokit shared code☆17Updated 6 years ago
- ☆24Updated 5 years ago
- ☆16Updated 2 years ago
- Decoders for 7ev3n ransomware☆15Updated 8 years ago
- ☆20Updated 4 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 5 years ago
- Collection Of Scripts And Utilities For Windows Event Hunting☆18Updated 5 years ago
- Simple shellcode injector.☆14Updated 6 years ago
- Zerokit server controller☆14Updated 6 years ago
- module for certexfil☆15Updated 3 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- API Tracker by Cysinfo Team☆22Updated 8 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Experimental: Windows .text section compare - disk versus memory☆14Updated 10 years ago
- Notes and goodies to make binary exploitation life easier☆10Updated 6 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 5 months ago
- Analysis and Modification Tool for Executables☆17Updated 6 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 4 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 12 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- ☆13Updated 4 years ago
- Debugger checks in 3 ways☆20Updated 7 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 7 years ago
- ☆11Updated 4 years ago
- ☆16Updated 5 years ago