JannisKirschner / Cutter-Yara-Plugin
Apply YARA rules to your Cutter projects.
☆16Updated 5 years ago
Alternatives and similar repositories for Cutter-Yara-Plugin:
Users that are interested in Cutter-Yara-Plugin are comparing it to the libraries listed below
- ☆18Updated 4 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Updated 8 months ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- ☆36Updated 5 years ago
- My conference presentations and publications☆26Updated 3 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 6 years ago
- ☆16Updated 3 years ago
- ☆27Updated 5 years ago
- Win32k Elevation of Privilege PocUpdated 5 years ago
- ssdeep cluster analysis for malware files☆31Updated 4 years ago
- ☆20Updated 5 years ago
- ☆50Updated 5 years ago
- BlazeFox Exploit☆18Updated 6 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆13Updated 5 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆36Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- ☆15Updated 4 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆26Updated 3 years ago
- Super IOCTL Basic Fuzzer☆15Updated 5 years ago
- A python script that can be used to scan data within in an IDB using Yara.☆22Updated 6 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- ☆24Updated 5 years ago
- ☆22Updated 4 years ago
- Radare2 Metadata Extraction to Elasticsearch☆22Updated 10 months ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- A collection of shellcode hashes☆17Updated 6 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago