WilliamMahler / Capstone.js-bookmarklet
☆10Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for Capstone.js-bookmarklet
- Test suite for bypassing Malware sandboxes.☆38Updated 10 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35Updated 9 years ago
- Network sinkhole for isolated malware analysis☆40Updated 6 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆34Updated 7 years ago
- Yara Plugin for Binary Ninja☆12Updated 6 years ago
- Volatility Plugins☆21Updated 9 years ago
- Memory awesomeness.☆29Updated 9 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Updated 8 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 7 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆16Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 6 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 8 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 9 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆43Updated 8 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 8 years ago
- ☆32Updated 5 months ago
- Automated memory forensics analysis☆32Updated 5 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆69Updated 10 years ago
- yara rules for crypto detection☆30Updated 10 years ago
- POC for IAT Parsing Payloads☆47Updated 7 years ago
- IDATACO IDA Pro Plugin☆47Updated 8 years ago