Cisco-Talos / clamav-bytecode-compilerLinks
ClamAV Bytecode Compiler
☆87Updated last year
Alternatives and similar repositories for clamav-bytecode-compiler
Users that are interested in clamav-bytecode-compiler are comparing it to the libraries listed below
Sorting:
- ☆32Updated last year
- Rootkit Detector for UNIX☆61Updated 2 years ago
- MALM: Malware Monitor☆50Updated 12 years ago
- C++ wrapper for YARA.☆45Updated 5 years ago
- Zero Wine Tryouts: An open source malware analysis tool☆17Updated 9 years ago
- ViDi Visual Disassembler (experimental)☆76Updated 2 years ago
- Official implementation of the VirusTotal API in C programming language☆113Updated 2 years ago
- Anti live forensic linux LKM rootkit☆17Updated 8 years ago
- DEPRECATED - replaced with "monitor"☆122Updated 9 years ago
- x86 emulation and shellcode detection☆153Updated last year
- ☆66Updated 6 years ago
- DiskCryptor - Open source partition encryption solution☆45Updated 11 years ago
- Plugin for x64dbg to generate Yara rules from function basic blocks.☆37Updated 8 years ago
- Parsing of YARA rules into AST and building new rulesets in C++.☆126Updated this week
- Dump Windows PE file information in C☆24Updated 10 years ago
- VMI on BitVisor to detect hidden rootkits.☆26Updated 8 years ago
- CAPE monitor DLLs☆41Updated 5 years ago
- Source codes for "The Antivirus Hackers Handbook" book.☆60Updated 10 years ago
- PE file manipulation library.☆64Updated 5 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- A collection of tools for injecting DSOs in processes under various operating systems☆50Updated 2 years ago
- Ablation is a tool for augmenting static analysis by extracting information at runtime, and importing it into IDA. It can resolve virtual…☆51Updated 9 years ago
- ☆26Updated 5 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆41Updated 6 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆73Updated 6 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- Dragon Sandbox☆78Updated 12 years ago
- Sample showing the use of CoGetInterceptor☆22Updated 4 years ago
- Set of python scripts to analyse PE32/PE64 binaries and to extract VB 5/6 headers and Visual Basic p-code functions.☆47Updated 10 years ago