1Project / Scanr
Detect x86 shellcode in files and traffic.
☆24Updated 6 years ago
Alternatives and similar repositories for Scanr:
Users that are interested in Scanr are comparing it to the libraries listed below
- ☆13Updated 7 years ago
- PIITracker: Automatic Tracking of Personally Identifiable Information in Windows☆19Updated 6 years ago
- General purpose repository for miscellaneous scripts, pcaps and malware IOCs that we share with the info-sec research community☆38Updated 4 years ago
- convert binary to VEX IR using the C interface provided by pyvex.☆16Updated 2 years ago
- Inject libraries into 32 processes on macOS Mojave☆13Updated 5 years ago
- Using LibVMI to detect malware☆31Updated 2 years ago
- ☆9Updated 7 years ago
- reverse engineering, visual binary analysis☆24Updated 8 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 4 years ago
- ☆9Updated 6 years ago
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 6 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Updated 4 years ago
- Malware analysis tool based on taint analysis.☆14Updated 3 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆31Updated 6 years ago
- 🐧 A simple kernel-level rootkit☆20Updated 9 years ago
- ssdeep cluster analysis for malware files☆30Updated 4 years ago
- API logger plugin for Intel Pintool☆14Updated 7 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Updated 4 years ago
- Some writeups in ctf.☆11Updated 3 years ago
- Static analysis tools for x86 assembly☆13Updated 8 years ago
- An Integrity-Check Monitoring Pintool☆56Updated 4 years ago
- Working Set Page Cache side-channel IPC PoC☆66Updated 6 years ago
- PoC for the taint-based ROP approach☆13Updated last year
- Kernel Cache Decryption for iOS☆14Updated 3 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Updated 5 years ago
- ☆16Updated 4 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago