Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis
☆65Sep 15, 2015Updated 10 years ago
Alternatives and similar repositories for BlackHat_2015
Users that are interested in BlackHat_2015 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 10 years ago
- Yet another Python library to read and write PE/PE+ files.☆78Oct 6, 2016Updated 9 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Android based APT exploitation framework☆36Jul 20, 2015Updated 10 years ago
- An open source, multi-architecture ROP compiler written in python☆163Jun 14, 2017Updated 8 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 9 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51May 3, 2016Updated 9 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 8 years ago
- A static Internet Explorer Fuzzer.☆50Jun 15, 2017Updated 8 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Processes and metrics for assessing obfuscation effectiveness☆55Jan 26, 2017Updated 9 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- Public presentations given on Frida at conferences☆102Aug 18, 2019Updated 6 years ago
- Ida Pro Ultimate Qt Build Guide☆27Dec 13, 2018Updated 7 years ago
- "Just Another ReVersIng Suite" or whatever other bullshit you can think of☆150Apr 28, 2023Updated 2 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- Scripting Assembly Language☆12Sep 2, 2015Updated 10 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆191Dec 19, 2015Updated 10 years ago
- A project to learn about malware and c++ coding☆23Sep 5, 2015Updated 10 years ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- map file generator for intel x86 binary based on flirt signature☆83May 2, 2016Updated 9 years ago
- capstone based disassembler for extracting to binnavi☆229Jun 8, 2016Updated 9 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Teach you a binary exploitation for great good.☆294Sep 26, 2018Updated 7 years ago
- Bit9 + Carbon Black Threat Intelligence☆81Mar 9, 2016Updated 10 years ago
- IDAPython plugin for finding Xrefs from a function☆48Jul 14, 2016Updated 9 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆160Jul 4, 2016Updated 9 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- Conference slides and White-papers☆360Jan 3, 2020Updated 6 years ago
- Simple shellcode decoder using unicorn-engine☆100Oct 17, 2015Updated 10 years ago