AndreaNaspi / WhiteRabbitTracker
WhiteRabbitTracker: Analyzing malware evasions with information flow tracking
☆16Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for WhiteRabbitTracker
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆71Updated 2 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆15Updated 7 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆30Updated last year
- The Tangled Genealogy of IoT Malware☆10Updated 3 years ago
- SAFE embeddings to match functions in yara☆100Updated 4 years ago
- Robust Automated Malware Unpacker☆84Updated last year
- Research tool able to detect and mitigate evasion techniques used by malware in-the-wild☆11Updated last year
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆83Updated 5 months ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆25Updated 8 years ago
- ☆57Updated 3 years ago
- Robust API monitoring system presented in the paper "Designing Robust API Monitoring Solutions" (IEEE TDSC)☆23Updated 2 years ago
- Port of the binary diffing library, diaphora, for radare2 and mariadb☆49Updated last year
- pyGoRE - Python library for analyzing Go binaries☆64Updated 2 years ago
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆10Updated 4 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆27Updated last year
- ☆23Updated 2 years ago
- A collection of well labeled ELF binaries compiled from benign and malicious code in various ways. Great for exploring similarity in exec…☆86Updated 7 months ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆57Updated 3 years ago
- Collection of DBI evasion techniques☆14Updated 2 years ago
- Automated Yara Rule generation using Biclustering☆60Updated 3 years ago
- Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing compiler artifacts, binaries…☆27Updated 3 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- ROP Benchmark is a tool to compare ROP compilers☆39Updated last year
- Build your emulation environment as needed☆64Updated 3 years ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆95Updated 2 months ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 3 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 3 years ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆86Updated 5 months ago
- ☆60Updated 2 years ago