☆36Feb 18, 2013Updated 13 years ago
Alternatives and similar repositories for BinSlayer
Users that are interested in BinSlayer are comparing it to the libraries listed below
Sorting:
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- ☆11Jun 10, 2015Updated 10 years ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Nov 7, 2018Updated 7 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- search and collect windows files from multiple locations on machine and store in one centralized directory☆20Aug 29, 2012Updated 13 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- random RE stuff☆21May 11, 2012Updated 13 years ago
- TRACY☆19Jul 1, 2016Updated 9 years ago
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Feb 22, 2013Updated 13 years ago
- The plugin is an integration of Virus Battle API to the well known IDA Disassembler.☆20May 26, 2015Updated 10 years ago
- In memory fuzzing for embedded devices☆19Jun 20, 2012Updated 13 years ago
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 8 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Oct 11, 2020Updated 5 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 9 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- Corewar project fully written in x86 Assembly - NASM - Linux☆20Jan 19, 2016Updated 10 years ago
- ☆27Mar 1, 2022Updated 4 years ago
- This project uses the .NET framework to bypass Antivirus solutions.☆29Mar 24, 2013Updated 12 years ago
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- A small utility to read and write to Macs physical memory using default AppleHWAccess.kext.☆25Sep 3, 2015Updated 10 years ago
- Barely working LLVM mode for AFL on OSX☆20Dec 22, 2016Updated 9 years ago
- A(nother) Binary Analysis Framework☆30Jun 10, 2014Updated 11 years ago
- A binary analysis tool for linux☆71Jun 2, 2020Updated 5 years ago
- REIL translation library☆36May 6, 2016Updated 9 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆106Dec 25, 2018Updated 7 years ago
- Memory fuzzing based on sinn3r's In Memory Fuzzer☆25Mar 1, 2012Updated 14 years ago
- Automated Memory Analysis (Black Hat Arsenal 2014)☆32Aug 4, 2014Updated 11 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Oct 27, 2011Updated 14 years ago
- Some glue facilitating remote use of IDA (the Interactive DisAssembler) Python API.☆77Jul 14, 2020Updated 5 years ago
- Test suite for bypassing Malware sandboxes.☆38Oct 20, 2014Updated 11 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Nov 18, 2012Updated 13 years ago
- Translate regular Assembly into Extended Instructions☆88Oct 9, 2012Updated 13 years ago
- ☆67Jan 8, 2020Updated 6 years ago
- IDA scripts and plugins for PS3☆80Aug 25, 2012Updated 13 years ago
- little scripts created during my time as a pentetration tester☆31Jun 17, 2012Updated 13 years ago
- The dll that can hide itself and then delete itselft.☆32Mar 31, 2013Updated 12 years ago
- Z3 Symbolic Execution python☆28Dec 28, 2017Updated 8 years ago