MicroSCOPE
amber
MicroSCOPE | amber | |
---|---|---|
3 | 1 | |
15 | 1,194 | |
- | - | |
3.8 | 2.9 | |
11 months ago | 9 months ago | |
Go | Go | |
BSD 3-clause "New" or "Revised" License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
MicroSCOPE
amber
-
How do Python programs run on computers without Python installed. Are they turned into exe files?
Crypter: https://github.com/EgeBalci/amber
What are some alternatives?
ransomwhere - A PoC ransomware sample to test out your ransomware response strategy.
pakkero - Pakkero is a binary packer written in Go made for fun and educational purpose. Its main goal is to take in input a program file (elf binary, script, even appimage) and compress it, protect it from tampering and intrusion.
Qu1cksc0pe - All-in-One malware analysis tool.
packer-builder-arm - Packer plugin to build ARM images
AtomPePacker - A Highly capable Pe Packer
pe - A :zap: lightweight Go package to parse, analyze and extract metadata from Portable Executable (PE) binaries. Designed for malware analysis tasks and robust against PE malformations.
go - The Go programming language
Proton-Crypter - Proton Crypter can be used fo education penetration test, personal tests, and to protect legal files which you do not want to be debugged or reverse engineered. We are not responsible for what you use our protection/encryption/obfuscation software for!
REconfig-linux - Configuration Extractor for the Linux variant of REvil Ransomware