bluepillBluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)
Stars: ✭ 94 (-80%)
MalwareHashDBMalware hashes for open source projects.
Stars: ✭ 31 (-93.4%)
learning-malware-analysisThis repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be compiled and used for learning purposes, without having to worry about handling live malware.
Stars: ✭ 124 (-73.62%)
emuiiboVirtual amiibo (amiibo emulation) system for Nintendo Switch
Stars: ✭ 584 (+24.26%)
Project RestorationA Majora's Mask 3D patch that restores some mechanics from the original game to get the best of both worlds
Stars: ✭ 448 (-4.68%)
PwndraA collection of pwn/CTF related utilities for Ghidra
Stars: ✭ 417 (-11.28%)
ScratchabitEasily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API
Stars: ✭ 369 (-21.49%)
Nt wrapperA wrapper library around native windows sytem APIs
Stars: ✭ 287 (-38.94%)
dalvikgateLightweight dex / odex / apk to jar converter
Stars: ✭ 32 (-93.19%)
MastermindMan in the middle testing
Stars: ✭ 341 (-27.45%)
BinsnitchDetect silent (unwanted) changes to files on your system
Stars: ✭ 144 (-69.36%)
iyovWeb proxy for http(s) for developers to analyze data between client and servers based on workerman, especailly for app developers.
Stars: ✭ 27 (-94.26%)
Linux.miraiLeaked Linux.Mirai Source Code for Research/IoC Development Purposes
Stars: ✭ 466 (-0.85%)
flare-emuNo description or website provided.
Stars: ✭ 561 (+19.36%)
Ssh Mitmssh mitm server for security audits supporting public key authentication, session hijacking and file manipulation
Stars: ✭ 335 (-28.72%)
ML-AntivirusAn antivirus powered by machine learning.
Stars: ✭ 32 (-93.19%)
static file analysisAnalysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules
Stars: ✭ 34 (-92.77%)
SsmaSSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]
Stars: ✭ 388 (-17.45%)
assemblyline-coreCore server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)
Stars: ✭ 16 (-96.6%)
jitmJITM is an automated tool to bypass the JIT Hooking protection on a .NET sample.
Stars: ✭ 27 (-94.26%)
Pe SieveScans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
Stars: ✭ 1,783 (+279.36%)
EmocheckEmotet detection tool for Windows OS
Stars: ✭ 334 (-28.94%)
Information Security TasksThis repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
Stars: ✭ 108 (-77.02%)
Edge2GuardCode for PerCom Workshop paper title 'Edge2Guard: Botnet Attacks Detecting Offline Models for Resource-Constrained IoT Devices'
Stars: ✭ 16 (-96.6%)
OpentendoAn Open-Source HardWare (OSHW) recreation of the original 1985 front-loading NES Motherboard
Stars: ✭ 362 (-22.98%)
RascalThe implementation of the Rascal meta-programming language (including interpreter, type checker, parser generator, compiler and JVM based run-time system)
Stars: ✭ 284 (-39.57%)
telfhashSymbol hash for ELF files
Stars: ✭ 75 (-84.04%)
Redriver2Driver 2 Playstation game reverse engineering effort
Stars: ✭ 426 (-9.36%)
MacholibreMach-O & Universal Binary Parser
Stars: ✭ 102 (-78.3%)
DdisasmA fast and accurate disassembler
Stars: ✭ 325 (-30.85%)
FlorentinoFast Static File Analysis Framework
Stars: ✭ 92 (-80.43%)
minerchkBash script to Check for malicious Cryptomining
Stars: ✭ 36 (-92.34%)
HyperpwnA hyper plugin to provide a flexible GDB GUI with the help of GEF, pwndbg or peda
Stars: ✭ 387 (-17.66%)
maldetectDebian packaging of Linux Malware Detect (https://github.com/rfxn/linux-malware-detect)
Stars: ✭ 48 (-89.79%)
Pikachu VolleyballPikachu Volleyball implemented into JavaScript by reverse engineering the original game
Stars: ✭ 324 (-31.06%)
dex2jarTools to work with android .dex and java .class files
Stars: ✭ 102 (-78.3%)
toolkitThe essential toolkit for reversing, malware analysis, and cracking
Stars: ✭ 176 (-62.55%)
Rat-Hunterdetect trojans by easy way 🛡️
Stars: ✭ 24 (-94.89%)
VirustotalA simple command-line script to interact with the virustotal-api
Stars: ✭ 50 (-89.36%)
TerracognitaReads from existing Cloud Providers (reverse Terraform) and generates your infrastructure as code on Terraform configuration
Stars: ✭ 452 (-3.83%)
Amocoyet another tool for analysing binaries
Stars: ✭ 413 (-12.13%)
Node Tutorial☺️Some of the node tutorial -《Node学习笔记》
Stars: ✭ 364 (-22.55%)
emeraldImport DynamoRIO drcov code coverage data into Ghidra
Stars: ✭ 30 (-93.62%)
python-icap-yaraAn ICAP Server with yara scanner for URL and content.
Stars: ✭ 50 (-89.36%)
MalcomMalcom - Malware Communications Analyzer
Stars: ✭ 988 (+110.21%)
malice-avMalice AntiVirus Plugins
Stars: ✭ 98 (-79.15%)
Intellij Java2smaliA plugin for IntelliJ IDEA & Android Studio to easily compile Java & Kotlin files to smali.
Stars: ✭ 384 (-18.3%)
apdu-interceptSmartcard APDU interception and MITM for one smartcard model
Stars: ✭ 33 (-92.98%)
Houki🧹 Customizable MitM proxy / 可定制化的中间人代理
Stars: ✭ 28 (-94.04%)
Capletsbettercap scripts (caplets) and proxy modules.
Stars: ✭ 363 (-22.77%)
Can reverse engineeringAutomated Payload Reverse Engineering Pipeline for the Controller Area Network (CAN) protocol
Stars: ✭ 282 (-40%)
Guanciale🥓 Grab info needed by Carbonara from executables and disassemblers databases
Stars: ✭ 14 (-97.02%)
bonomenBONOMEN - Hunt for Malware Critical Process Impersonation
Stars: ✭ 42 (-91.06%)
Malware ResearchCode written as part of our various malware investigations
Stars: ✭ 281 (-40.21%)