ANSSI-FR / Binacle
Full-bin indexation of binary files
☆95Updated 6 years ago
Alternatives and similar repositories for Binacle:
Users that are interested in Binacle are comparing it to the libraries listed below
- NASM Standard Library for shellcode☆69Updated 8 years ago
- Synesthesia, implemented as Yices scripts☆93Updated 7 years ago
- grap: define and match graph patterns within binaries☆170Updated 4 years ago
- rune - radare2 based symbolic emulator☆26Updated 7 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆48Updated 4 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆67Updated 7 years ago
- A place holder for Keystone repo. See https://github.com/keystone-engine/keystone for the real stuff☆67Updated 2 years ago
- Thread Injection Kit. A notorious little attempt to create Windows CreateRemoteThread() equivalent on unix (*nix) platform.☆48Updated 13 years ago
- RAIR: RAdare In Rust☆75Updated 6 months ago
- kernel exploitation helper class☆76Updated 8 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 8 years ago
- General Research Repository - Only updated when I feel like it☆28Updated 5 months ago
- ☆67Updated 3 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆158Updated 8 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 7 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 8 years ago
- Blazingly fast Linux syscall collector☆74Updated 7 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- AppJailLauncher in Rust☆108Updated 3 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆97Updated 8 years ago
- Slides and very basic examples☆111Updated 7 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Updated 4 years ago
- A Genetic File, Syscall and Network Fuzzer.☆59Updated 7 years ago
- POLAR☆73Updated 6 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- Statically linked Library detector☆70Updated 10 years ago
- Implementation of the SMM rootkit "The Watcher"☆124Updated 3 years ago