Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis
☆65Sep 15, 2015Updated 10 years ago
Alternatives and similar repositories for BlackHat_2015
Users that are interested in BlackHat_2015 are comparing it to the libraries listed below
Sorting:
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 9 years ago
- Yet another Python library to read and write PE/PE+ files.☆78Oct 6, 2016Updated 9 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- An open source, multi-architecture ROP compiler written in python☆163Jun 14, 2017Updated 8 years ago
- Android based APT exploitation framework☆36Jul 20, 2015Updated 10 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆38May 2, 2017Updated 8 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51May 3, 2016Updated 9 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- "Just Another ReVersIng Suite" or whatever other bullshit you can think of☆150Apr 28, 2023Updated 2 years ago
- Simple shellcode decoder using unicorn-engine☆100Oct 17, 2015Updated 10 years ago
- A project to learn about malware and c++ coding☆23Sep 5, 2015Updated 10 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 10 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 9 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆191Dec 19, 2015Updated 10 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- A static Internet Explorer Fuzzer.☆50Jun 15, 2017Updated 8 years ago
- Collection of modified open fuzzer.☆30Jun 9, 2012Updated 13 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- Ida Pro Ultimate Qt Build Guide☆27Dec 13, 2018Updated 7 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Teach you a binary exploitation for great good.☆294Sep 26, 2018Updated 7 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆160Jul 4, 2016Updated 9 years ago
- map file generator for intel x86 binary based on flirt signature☆83May 2, 2016Updated 9 years ago
- TrueType Font Fuzzer☆53Nov 6, 2015Updated 10 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Tools, documentation and test inputs for fuzzing opensource projects with AddressSanitizer and friends.☆29Sep 24, 2015Updated 10 years ago
- Bit9 + Carbon Black Threat Intelligence☆81Mar 9, 2016Updated 9 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- ☆16Nov 16, 2015Updated 10 years ago