Cisco-Talos / clamav-bytecode-compilerLinks
ClamAV Bytecode Compiler
☆87Updated last year
Alternatives and similar repositories for clamav-bytecode-compiler
Users that are interested in clamav-bytecode-compiler are comparing it to the libraries listed below
Sorting:
- Rootkit Detector for UNIX☆61Updated 2 years ago
- MALM: Malware Monitor☆50Updated 12 years ago
- ☆32Updated last year
- ☆66Updated 6 years ago
- Zero Wine Tryouts: An open source malware analysis tool☆17Updated 9 years ago
- C++ wrapper for YARA.☆45Updated 5 years ago
- Plugin for x64dbg to generate Yara rules from function basic blocks.☆37Updated 8 years ago
- Dragon Sandbox☆79Updated 12 years ago
- Source codes for "The Antivirus Hackers Handbook" book.☆61Updated 10 years ago
- ViDi Visual Disassembler (experimental)☆78Updated 2 years ago
- Official implementation of the VirusTotal API in C programming language☆113Updated 2 years ago
- Anti live forensic linux LKM rootkit☆17Updated 8 years ago
- Security Research and Development Framework☆106Updated 10 years ago
- DiskCryptor - Open source partition encryption solution☆45Updated 11 years ago
- Linux-KVM with rVMI extensions☆22Updated 8 years ago
- Parsing of YARA rules into AST and building new rulesets in C++.☆127Updated 3 weeks ago
- ☆26Updated 5 years ago
- ☆54Updated 9 months ago
- Dump Windows PE file information in C☆24Updated 10 years ago
- CAPE monitor DLLs☆41Updated 5 years ago
- OllyHeapTrace is a plugin for OllyDbg to trace the heap operations being performed by a process.☆56Updated 13 years ago
- Library and tools to access the Windows Event Log (EVT) format☆60Updated last year
- ransomware_begone☆42Updated 9 years ago
- DEPRECATED - replaced with "monitor"☆122Updated 9 years ago
- ☆47Updated 7 years ago
- Sample showing the use of CoGetInterceptor☆22Updated 4 years ago
- My own versions from the programs of the book "Practical Binary Analysis"☆55Updated 6 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- ☆51Updated 4 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago