a4lg / libffuzzyLinks
Fast ssdeep comparison library
☆13Updated 10 years ago
Alternatives and similar repositories for libffuzzy
Users that are interested in libffuzzy are comparing it to the libraries listed below
Sorting:
- Generic Executable Unpacking using Dynamic Binary Instrumentation☆12Updated 10 years ago
- A tiny tool to learn the assembly code☆11Updated 8 years ago
- IDA plugin investigating the internal representation of IDC scripts☆14Updated last year
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Updated 10 years ago
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- A script to reverse-engineer anti-virus signatures☆32Updated 12 years ago
- Graphical analysis of PDF structure.☆12Updated 8 years ago
- swffile.py - SWF file parser module in Python☆28Updated 9 years ago
- Web based code browser using clang to provide basic code analysis.☆44Updated 7 years ago
- Anti live forensic linux LKM rootkit☆17Updated 8 years ago
- x64 Windows Software Fault Injection Tool☆17Updated 7 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- ☆28Updated 8 years ago
- ☆10Updated 4 months ago
- ☆11Updated 10 years ago
- Packed Malware Analyzer (PACKMAN)☆12Updated 9 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- IDA WhatAPIs PlugIn☆7Updated 9 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 10 years ago
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 7 years ago
- Framework complet d'analyse de malware☆12Updated 9 years ago
- ☆28Updated 3 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆16Updated last year
- Parallel ssdeep clustering kit☆20Updated 7 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- ☆14Updated 9 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆28Updated 10 years ago