Fare9 / ANBULinks
ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.
☆91Updated 6 years ago
Alternatives and similar repositories for ANBU
Users that are interested in ANBU are comparing it to the libraries listed below
Sorting:
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆85Updated 3 years ago
- ☆28Updated 10 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆123Updated 4 years ago
- Hansel - a simple but flexible search for IDA☆25Updated 5 years ago
- ☆91Updated 5 years ago
- Flare-On solutions☆36Updated 5 years ago
- IDA Pro resources, scripts, and configurations☆112Updated 2 weeks ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆94Updated 3 years ago
- ☆99Updated 11 months ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆109Updated 5 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- This IDAPython script tags subroutines according to their use of imported functions☆73Updated 4 years ago
- pyGoRE - Python library for analyzing Go binaries☆64Updated 3 years ago
- A Python tool to generate ROP chains☆63Updated 4 months ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆43Updated last year
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 5 years ago
- Polymorphic VM and PoliCTF '17 reversing challenge.☆73Updated 8 months ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- ☆34Updated 9 years ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆73Updated 5 years ago
- ☆51Updated 6 years ago
- Static unpacker for FinSpy VM☆101Updated 3 years ago
- ☆89Updated 6 years ago
- ☆39Updated 4 years ago
- Windows API tracer for malware (oldname: unitracer)☆118Updated 7 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆41Updated 5 years ago
- ☆33Updated 8 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago