P4nD3m1CB0Y0xD
Reverse engineering 🔧 Malware lover ☢ Low level 🔍 Cybersecurity 🛡
somewhere between us and them
P4nD3m1CB0Y0xD's Stars
bol-van/zapret
DPI bypass multi platform
flozz/p0wny-shell
Single-file PHP shell
neurobin/shc
Shell script compiler
michalmalik/linux-re-101
A collection of resources for linux reverse engineering
fabrimagic72/malware-samples
A collection of malware samples caught by several honeypots i manage
unixpickle/gobfuscate
Obfuscate Go binaries and packages
tyranid/DotNetToJScript
A tool to create a JScript file which loads a .NET v2 assembly from memory.
can1357/ThePerfectInjector
Literally, the perfect injector.
daem0nc0re/PrivFu
Kernel mode WinDbg extension and PoCs for token privilege investigation.
forrest-orr/moneta
Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs
SafeBreach-Labs/WindowsDowndate
A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities
Aegrah/PANIX
Customizable Linux Persistence Tool for Security Research and Detection Engineering.
yanncam/UnSHc
UnSHc - How to decrypt SHc *.sh.x encrypted file ?
kyxiaxiang/Beacon_Source
not a reverse-engineered version of the Cobalt Strike Beacon
CERT-Polska/malduck
:duck: Malduck is your ducky companion in malware analysis journeys
CybercentreCanada/assemblyline
AssemblyLine 4: File triage and malware analysis
suleram/View8
View8 - Decompiles serialized V8 objects back into high-level readable code.
struppigel/PortexAnalyzerGUI
Graphical interface for PortEx, a Portable Executable and Malware Analysis Library
ashemery/Anti-Forensics
A Repository to Track Anti-Forensic Techniques
csvl/SEMA
SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SCDG). Those SCDGs can be exploited in machine learning modules to do classification/detection.
0xjet/ccc
A short graduate course on cybercrime, cyberespionage, and cyberoperations
d-Raco/android-malware-source-code-samples
Android malware source code dataset collected from public resources.
4n0nym0us/4n4lDetector
Advanced static analysis tool
bkerler/Sniffle
A sniffer for Bluetooth 5 and 4.x LE
cxiao/rust-reversing-workshop-recon-2024
0mWindyBug/RansomGuard
anti-ransomware file-system filter
N0fix/rustbininfo
Get information about stripped rust executables
maldeclabs/CrowArmor
Hardening in the Linux kernel
estr3llas/simple_vm
A simple bytecode Virtual Machine.
Pr0teus/malandres-lingo
Corretores ortográficos são ótimos para corrigir erros de digitação, mas também podem ser usados para alterar a nossa forma de escrever, de forma mascarar nossa personalidade.