ANSSI-FR / BinacleLinks
Full-bin indexation of binary files
☆95Updated 7 years ago
Alternatives and similar repositories for Binacle
Users that are interested in Binacle are comparing it to the libraries listed below
Sorting:
- NASM Standard Library for shellcode☆69Updated 9 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆49Updated 4 years ago
- Command-line tool that breaks rotating-xor (and similar) ciphertexts☆98Updated 7 months ago
- grap: define and match graph patterns within binaries☆172Updated 4 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 8 years ago
- Implementation of the SMM rootkit "The Watcher"☆128Updated 3 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆159Updated 9 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 8 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Updated 5 years ago
- AppJailLauncher in Rust☆108Updated 4 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 10 years ago
- Binary Ninja plugin to decompile binaries using RetDec API☆164Updated 7 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆187Updated 3 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 9 years ago
- ☆86Updated 8 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Updated 9 years ago
- A set of scripts for a radare-based malware code analysis workflow☆68Updated 6 years ago
- Binary Ninja Posters☆35Updated 5 years ago
- A place holder for Keystone repo. See https://github.com/keystone-engine/keystone for the real stuff☆67Updated 3 years ago
- ☆91Updated 8 years ago
- Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins☆134Updated 6 years ago
- Your bag of handy codes for malware researchers☆120Updated 5 years ago
- A novel technique to hide code from debuggers & disassemblers☆158Updated last year
- ☆53Updated 7 years ago
- POLAR☆73Updated 6 years ago
- Statically linked Library detector☆70Updated 10 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 9 years ago
- Proof-of-concept automated baremetal malware analysis framework.☆14Updated 10 years ago