WithSecureOpenSource / seeLinks
Sandboxed Execution Environment
☆819Updated 4 years ago
Alternatives and similar repositories for see
Users that are interested in see are comparing it to the libraries listed below
Sorting:
- BARF : A multiplatform open source Binary Analysis and Reverse engineering Framework☆1,419Updated 5 years ago
- LLDB MCP Integration + other helpful commands☆726Updated 2 months ago
- Haka runtime☆450Updated 7 years ago
- Deprecated - MIG Memory Forensic library☆386Updated 3 years ago
- Binary analysis and management framework☆1,546Updated last year
- Distributed & real time digital forensics at the speed of the cloud☆1,203Updated 5 years ago
- A Linux packet crafting tool.☆468Updated 4 years ago
- Malcom - Malware Communications Analyzer☆1,161Updated 7 years ago
- Deprecated Binary Ninja prototype written in Python☆523Updated 4 years ago
- All your IPs are belong to us.☆670Updated 7 years ago
- Visual reverse engineering tool. Veles is better, use it. Don't use this.☆588Updated 4 years ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,666Updated last year
- Monitor the output of terminals and processes.☆1,013Updated 9 years ago
- Malspider is a web spidering framework that detects characteristics of web compromises.☆415Updated 2 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆375Updated 3 years ago
- Rekall Memory Forensic Framework☆1,955Updated 4 years ago
- Official repository for Pyew.☆392Updated 5 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆679Updated 3 years ago
- A libre cross-platform disassembler.☆1,443Updated 6 years ago
- The DrK Attack - Proof of concept☆343Updated 3 years ago
- Malicious HTTP traffic explorer☆717Updated 2 years ago
- Teach you a binary exploitation for great good.☆294Updated 6 years ago
- Tool for launching a Linux process from a snapshot☆450Updated 9 years ago
- peinjector - MITM PE file infector☆603Updated 9 years ago
- A tool to retrieve malware directly from the source for security researchers.☆563Updated 7 years ago
- How to backdoor Diffie-Hellman☆612Updated 8 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆190Updated 9 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,040Updated 3 years ago
- Incident Response Forensic Framework☆600Updated 5 years ago
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 4 years ago