a4lg / libffuzzy
Fast ssdeep comparison library
☆13Updated 10 years ago
Alternatives and similar repositories for libffuzzy
Users that are interested in libffuzzy are comparing it to the libraries listed below
Sorting:
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 7 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Updated 10 years ago
- Parallel ssdeep clustering kit☆20Updated 7 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆24Updated 8 years ago
- Generic Executable Unpacking using Dynamic Binary Instrumentation☆12Updated 10 years ago
- reverse engineering, visual binary analysis☆24Updated 8 years ago
- A Python parser for Rich Headers☆14Updated 9 years ago
- IDA plugin investigating the internal representation of IDC scripts☆14Updated last year
- A tiny tool to learn the assembly code☆11Updated 8 years ago
- Basic x86 Symbolic Execution for educational purposes☆18Updated 8 years ago
- Anti live forensic linux LKM rootkit☆17Updated 8 years ago
- ☆28Updated 7 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 10 years ago
- ☆28Updated 3 years ago
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago
- Python library for image hashing and deduplication☆11Updated 9 years ago
- Yara filetype plugin for Vim.☆14Updated 4 years ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Updated 8 years ago
- C code metamorphic obfuscator☆14Updated 10 years ago
- Web based code browser using clang to provide basic code analysis.☆44Updated 7 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆28Updated 10 years ago
- ☆13Updated 7 years ago
- Regular expression Search on the command-line☆16Updated last month
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆16Updated last year
- Generate MAEC XML from Ero Carrera's pefile output☆15Updated 8 years ago
- An IdaPython tool for getting syscall's ID and function name from ntdll.dll, user32.dll, and so on.☆12Updated 8 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago