Stars
Distributed malware processing framework based on Python, Redis and S3.
The agent that grows with you
Repository hosting the bluehammer vulnerability
tukuaiai / vibe-coding-cn
Forked from EnzeD/vibe-codingVibe Coding 指南 - 涵盖 Prompt 提示词、Skill 技能库、Workflow 工作流的 AI 编程工作站
DRAKVUF Sandbox - automated hypervisor-level malware analysis system
Leaked Mirai Source Code for Research/IoC Development Purposes
Secure, Fast, and Extensible Sandbox runtime for AI agents.
Specification and documentation for Agent Skills
The project uses SSDT Hooking to bypass security checks during driver loading by hooking NtLoadDriver and modifying the PreviousMode flag.
This repo contains driver samples prepared for use with Microsoft Visual Studio and the Windows Driver Kit (WDK). It contains both Universal Windows Driver and desktop-only driver samples.
SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (…
Malware Configuration And Payload Extraction
A book for Learning the Foundations of LLMs
Tools for creating, modifying, assembling and disassembling RemObjects PascalScript files.
Inno Setup is an open-source installation builder for Windows applications by Jordan Russell and Martijn Laan. Since its introduction in 1997, Inno Setup has been trusted by developers and organiza…
Technically-oriented PDF Collection (Papers, Specs, Decks, Manuals, etc)
The FLARE team's open-source tool to identify capabilities in executable files.
🤗 Transformers: the model-definition framework for state-of-the-art machine learning models in text, vision, audio, and multimodal models, for both inference and training.
Realization of paper: "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN" 2017
Reverse Engineering: Decompiling Binary Code with Large Language Models
🌐 Make websites accessible for AI agents. Automate tasks online with ease.
A machine learning tool that ranks strings based on their relevance for malware analysis.
Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection