1Project / ScanrLinks
Detect x86 shellcode in files and traffic.
☆25Updated 7 years ago
Alternatives and similar repositories for Scanr
Users that are interested in Scanr are comparing it to the libraries listed below
Sorting:
- ☆9Updated 8 years ago
- ☆13Updated 8 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- Using LibVMI to detect malware☆31Updated 3 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Updated 4 years ago
- ELF packer for i386☆32Updated 9 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Updated 4 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 7 years ago
- Misc IDA Pro scripts☆24Updated 8 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Updated 5 years ago
- collection of used Tools for CTFs☆15Updated 3 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Updated 5 years ago
- Rootkit Detector for UNIX☆61Updated last year
- Basic x86 Symbolic Execution for educational purposes☆18Updated 8 years ago
- ida python scripts☆23Updated 6 years ago
- File antivirus☆10Updated 6 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 5 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago
- Rekall Memory Forensic Framework☆32Updated 5 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆10Updated 7 years ago
- A repository with simple projects created for testing/learning purpose☆46Updated 3 years ago
- Miscellaneous IDA scripts and projects☆14Updated 4 years ago
- ☆34Updated 3 years ago
- Scripts targeting specific families☆13Updated 8 years ago
- My manual analysis of malware families☆13Updated 8 years ago
- ☆17Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago