Pinned Repositories
al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
DECAF
DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the DroidScope dynamic Android malware analysis platform. DroidScope is now an extension to DECAF.
ABD
Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories
blue
Some anti QEMU trick used by in-the-wild malware.
inshort
論文を読んだふりしてライバルに差をつけろ
onionstack
A Pictorial Book of Tor Hidden Services.
peeling-onions
A repository to store Deep Web (onion domain) crawler, scraper, and NLP tools for Tor network.
temu
TEMU: The BitBlaze Dynamic Analysis Component (with some patches).
vine
Vine: The BitBlaze Static Analysis Component
virustream
A script to track malware IOCs with OSINT on Twitter.
ntddk's Repositories
ntddk/virustream
A script to track malware IOCs with OSINT on Twitter.
ntddk/onionstack
A Pictorial Book of Tor Hidden Services.
ntddk/inshort
論文を読んだふりしてライバルに差をつけろ
ntddk/angr-doc-ja
ntddk/transcibe
A script to transcribe audio files with Google Cloud Speech API.
ntddk/Abyss-Watcher
Abyss Watcher - Malware Downloader
ntddk/pyrebox-playground
A repository to store PyREBox plugins.
ntddk/binsec-vagrant
Easy to use BINSEC Vagrant image.
ntddk/al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
ntddk/immortan
A project to locate and visualize enemies of the internet.
ntddk/userstream_image_downloader
Twitter Userstream Image Downloader
ntddk/c2
pseudo dga **for education**
ntddk/dotfiles
.files
ntddk/geteip
tiny DECAF plugin
ntddk/seisan
傾斜配分を支える技術
ntddk/arybo
Manipulation, canonicalization and identification of mixed boolean-arithmetic symbolic expressions
ntddk/hexo-theme-jathena
A clean, minimalist and responsive theme for hexo for Japanese.
ntddk/archbot
Chat bot limited use in SFC RG Arch Group
ntddk/DECAF
DECAF(short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the DroidScope dynamic Android malware analysis platform. DroidScope is now an extension to DECAF.
ntddk/dionaea
dionaea low interaction honeypot (forked from dionaea.carnivore.it)
ntddk/dionaea-hardened
Home of the dionaea honeypot
ntddk/HyperPlatform
Intel VT-x based hypervisor aiming to provide a thin VM-exit filtering platform on Windows.
ntddk/idasec
IDA plugin for reverse-engineering and dynamic interactions with the Binsec platform
ntddk/malware
Malware Samples. Uploaded to GitHub for those want to analyse the code.
ntddk/PasteHunter
Scanning pastebin with yara rules
ntddk/pyrebox
ntddk/symexec-engine-modoki
Symbolic Execution Engine Modoki
ntddk/syntia
Program synthesis based deobfuscation framework for the USENIX 2017 paper "Syntia: Synthesizing the Semantics of Obfuscated Code"
ntddk/vboxhardening
ntddk/z3_codegen
A toy code generator (i.e. "program synthesis") using the Z3 solver