DRAKVUF Black-box Binary Analysis
☆15Feb 26, 2026Updated last month
Alternatives and similar repositories for drakvuf
Users that are interested in drakvuf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Modified python version of Rolf Rolles' https://github.com/RolfRolles/HexRaysDeob to unflatten Emotet'S Control Flow Flattening☆27May 5, 2022Updated 3 years ago
- code obfuscation via control flow flattening☆13Jan 5, 2018Updated 8 years ago
- Client library for the mwdb service by CERT Polska.☆42Feb 10, 2026Updated 2 months ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Apr 14, 2023Updated 3 years ago
- ☆14Dec 10, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- DRAKVUF Black-box Binary Analysis☆1,221Mar 5, 2026Updated last month
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,287Apr 7, 2026Updated last week
- ☆13Dec 1, 2020Updated 5 years ago
- GDB plug-in based on PWNDBG, GEF and PEDA that makes debugging MIPS with GDB suck less☆16Sep 18, 2024Updated last year
- Active Directory Password Spray Testing Utility in Go☆18Mar 22, 2024Updated 2 years ago
- Ekoparty's BlueSpace Keynote November 2021. Shoutout to @plugxor Muchas Gracias!!!☆13Jun 5, 2023Updated 2 years ago
- Ghidra变强术,一个Ghidra脚本库,二进制安全,PWN☆12Jan 21, 2024Updated 2 years ago
- Simulation of my relay computer using angular☆11Updated this week
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Proofs-Of-360Security Sandbox Escape☆10Mar 18, 2022Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- Digital Forensics date and time☆23Apr 11, 2026Updated last week
- ☆12Jan 6, 2023Updated 3 years ago
- ☆19Sep 21, 2020Updated 5 years ago
- idax: IDASDK extension libraries☆23Oct 12, 2025Updated 6 months ago
- ☆17Aug 24, 2020Updated 5 years ago
- Patch for the emulation of Octeon MIPS64 in QEMU☆15Feb 2, 2018Updated 8 years ago
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆13Oct 3, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Symbolic Execution for WebAssembly☆10Jun 10, 2018Updated 7 years ago
- ☆17Jul 16, 2020Updated 5 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Dec 27, 2022Updated 3 years ago
- ☆12Aug 8, 2019Updated 6 years ago
- Tiny project with that demonstrates how to enable Return Flow Guard☆12Feb 7, 2017Updated 9 years ago
- Binary tools library write in C☆10Nov 21, 2019Updated 6 years ago
- Javascript Botnet☆27Aug 14, 2018Updated 7 years ago
- openthos based on android-x86☆10Mar 27, 2020Updated 6 years ago
- IDA Pro Python plugin to analyze and annotate Linux kernel alternatives☆23Dec 15, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Write mach-o minidumps that can be analyzed with lldb☆12Nov 12, 2020Updated 5 years ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 10 months ago
- Shellcode Loader using indirect syscalls☆16Jan 21, 2024Updated 2 years ago
- Unpacks Microsoft LZNT1-compressed files by calling RtlDecompressBuffer☆13Sep 10, 2014Updated 11 years ago
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Dec 23, 2018Updated 7 years ago
- Supply Chain Security Research - Attack Trees☆10Jan 9, 2023Updated 3 years ago
- ROM of the Month☆14May 3, 2023Updated 2 years ago