mal_unpack
Stuxnet-Source
mal_unpack | Stuxnet-Source | |
---|---|---|
1 | 2 | |
632 | 151 | |
- | - | |
5.5 | 8.0 | |
2 months ago | 3 days ago | |
C | C | |
BSD 2-clause "Simplified" License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
mal_unpack
Stuxnet-Source
What are some alternatives?
MemLabs - Educational, CTF-styled labs for individuals interested in Memory Forensics
Malware-Sample-Sources - Malware Sample Sources
hollows_hunter - Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
radare2 - UNIX-like reverse engineering framework and command-line toolset
dll_to_exe - Converts a DLL into EXE
INSTA - INSTA - Instant Volumetric Head Avatars [CVPR2023]
radare2 - UNIX-like reverse engineering framework and command-line toolset [Moved to: https://github.com/radareorg/radare2]
r77-rootkit - Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
pe-sieve - Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
MalwareDatabase - One of the few malware collection