GlacierW / MBALinks
Malware Behavior Analyzer
☆159Updated 8 years ago
Alternatives and similar repositories for MBA
Users that are interested in MBA are comparing it to the libraries listed below
Sorting:
- ☆115Updated 9 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 7 years ago
- ☆91Updated 8 years ago
- zer0m0n driver for cuckoo sandbox☆88Updated 9 years ago
- Windows API tracer for malware (oldname: unitracer)☆118Updated 7 years ago
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆85Updated 3 years ago
- Automated malware unpacker☆120Updated 9 years ago
- Command-line and Python debugger for instrumenting and modifying native software behavior on Windows and Linux.☆164Updated 2 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆92Updated 6 years ago
- A Tool to Unpack Self-Modifying Code using DynamoRIO☆141Updated 8 years ago
- Malware Sandbox Emulation in Python @ HITCON 2018☆46Updated 7 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- Yet another Python library to read and write PE/PE+ files.☆78Updated 8 years ago
- ☆99Updated last year
- ☆43Updated 6 years ago
- ☆28Updated 10 years ago
- Smart DLL execution for malware analysis in sandbox systems☆144Updated 10 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆86Updated 8 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- Collection of pin tools☆52Updated 9 years ago
- A tool to detect and crash Cuckoo Sandbox☆295Updated last year
- A Lightweight Malware Configuration Parsing Tool☆15Updated 5 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆135Updated 9 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- Modified edition of cuckoomon☆49Updated 7 years ago
- ☆109Updated 8 years ago
- ASERT shared scripts for reversing☆32Updated 7 years ago
- Implementation of the DIMVA 2017 publication "Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps"☆69Updated 3 years ago
- ☆52Updated 10 years ago
- Automatically rebuild Import Address Table for dumped PE file. With python bindings!☆120Updated 6 years ago