Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings
View whichbuffer's full-sized avatar
:octocat:
Focusing
:octocat:
Focusing

Highlights

  • Pro

Block or report whichbuffer

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. Antidebug Antidebug Public

    Defeating Anti-Debugging Techniques for Malware Analysis

    C++ 12 5

  2. Conti-Ransomware-IOC Conti-Ransomware-IOC Public

    7 2

  3. Lockbit-Black-3.0 Lockbit-Black-3.0 Public

    27 11

  4. Malware-Config-Extractors Malware-Config-Extractors Public

    Static configuration extractors for various Malware samples.

    Python 2

  5. Threat-Detection-Rules Threat-Detection-Rules Public

    Threat Detection Repository - YARA / SIGMA rules

    YARA 5

  6. Useful-IDA-Scripts Useful-IDA-Scripts Public

    Collection of usefull IDA scripts (Python - IDC)

    Python

Morty Proxy This is a proxified and sanitized view of the page, visit original site.