☆36Feb 18, 2013Updated 13 years ago
Alternatives and similar repositories for BinSlayer
Users that are interested in BinSlayer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Nov 7, 2018Updated 7 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆11Jun 10, 2015Updated 10 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 10 years ago
- search and collect windows files from multiple locations on machine and store in one centralized directory☆20Aug 29, 2012Updated 13 years ago
- A(nother) Binary Analysis Framework☆31Jun 10, 2014Updated 11 years ago
- TRACY☆19Jul 1, 2016Updated 9 years ago
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Feb 22, 2013Updated 13 years ago
- The plugin is an integration of Virus Battle API to the well known IDA Disassembler.☆20May 26, 2015Updated 10 years ago
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A binary analysis tool for linux☆71Jun 2, 2020Updated 5 years ago
- ☆27Mar 1, 2022Updated 4 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆106Dec 25, 2018Updated 7 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆125May 18, 2025Updated 10 months ago
- Some glue facilitating remote use of IDA (the Interactive DisAssembler) Python API.☆77Jul 14, 2020Updated 5 years ago
- PyFFI is a Python library for processing block structured files.☆21Nov 17, 2012Updated 13 years ago
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 8 years ago
- This project uses the .NET framework to bypass Antivirus solutions.☆29Mar 24, 2013Updated 13 years ago
- A small utility to read and write to Macs physical memory using default AppleHWAccess.kext.☆25Sep 3, 2015Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Oct 27, 2011Updated 14 years ago
- Customized version of QEMU 2.4.0 exposing the TCG frontend and the helpers☆18Dec 22, 2025Updated 3 months ago
- Pritunl Zero Docker image☆18Nov 12, 2025Updated 5 months ago
- The scalable bug search for binaries☆71Dec 17, 2016Updated 9 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- Barely working LLVM mode for AFL on OSX☆20Dec 22, 2016Updated 9 years ago
- ☆13Mar 29, 2021Updated 5 years ago
- random RE stuff☆21May 11, 2012Updated 13 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- An Interactive Pcap Editor (based on Scapy)☆23Oct 11, 2020Updated 5 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- Windows Privilege Escalation☆10Dec 27, 2014Updated 11 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 7 years ago
- ☆139Jun 15, 2018Updated 7 years ago
- An optimizing decompiler (modified to use remill semantics)☆30Jan 4, 2019Updated 7 years ago
- ☆16Oct 4, 2012Updated 13 years ago