Sojobo
Stuxnet-Source
Sojobo | Stuxnet-Source | |
---|---|---|
1 | 2 | |
132 | 153 | |
- | - | |
0.0 | 8.0 | |
over 3 years ago | 8 days ago | |
F# | C | |
GNU General Public License v3.0 or later | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Sojobo
-
Alan - A post exploitation framework
I know the open-source Armitage project, but I'm not quite sure what you mean, since it is a different project. I said that I'm in the same position because neither all my projects are closed source too (https://github.com/enkomio/Sojobo, https://github.com/enkomio/sacara, https://github.com/enkomio/anathema, https://github.com/enkomio/shed, https://github.com/enkomio/s4tanic0d3). The main difference that I see is that Armitage had much more visibility. Don't get me wrong, I'm not discrediting Armitage, it is a nice project that was able to fulfill an existing gap with a perfect time-to-market. So, if I understood correctly, even if we both released open source projects without any hidden malicious intent, I don't deserve trust because I didn't release a project with a good visibility, am I correct?
Stuxnet-Source
What are some alternatives?
B2R2 - B2R2 is a collection of useful algorithms, functions, and tools for binary analysis.
mal_unpack - Dynamic unpacker based on PE-sieve
sacara - Sacara VM
Malware-Sample-Sources - Malware Sample Sources
shed - .NET runtime inspector
radare2 - UNIX-like reverse engineering framework and command-line toolset
OneNoteAnalyzer - A C# based tool for analysing malicious OneNote documents
INSTA - INSTA - Instant Volumetric Head Avatars [CVPR2023]
r77-rootkit - Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
MalwareDatabase - One of the few malware collection
MacOSThreatTrack - Bash tool used for proactive detection of malicious activity on macOS systems.
Simple-Polymorphic-Engine-SPE32 - Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used to demonstrate what polymorphic engines are.