SummitRoute / srepp_serverLinks
Summit Route End Point Protection - Server code
☆12Updated 9 years ago
Alternatives and similar repositories for srepp_server
Users that are interested in srepp_server are comparing it to the libraries listed below
Sorting:
- Scanner for Regin Virtual Filesystems☆26Updated 10 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Updated 8 years ago
- Malware analyses and helpful scripts☆29Updated 3 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- Analysis PE file or Shellcode☆50Updated 9 years ago
- ☆10Updated 7 years ago
- Anti-AV compilation☆44Updated 11 years ago
- Network detector for Winnti malware☆20Updated 7 years ago
- ☆22Updated 8 years ago
- Summit Route End Point Protection - Client code☆17Updated 9 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 9 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 10 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 10 years ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Updated 9 years ago
- QEMU with rVMI extensions☆25Updated 8 years ago
- Random Code Store☆17Updated 2 years ago
- My manual analysis of malware families☆13Updated 8 years ago
- Malware.lu configuration extractor☆25Updated 11 years ago
- ☆28Updated 3 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- ☆28Updated 8 years ago
- Automatically exported from code.google.com/p/verify-sigs☆18Updated 9 years ago
- ☆10Updated 7 years ago
- ☆21Updated 9 years ago
- A tool to generate yara signatures from function blocks☆19Updated 10 years ago
- Framework complet d'analyse de malware☆12Updated 9 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆43Updated 8 years ago
- Simple NTFS crawler.☆56Updated 8 years ago