airbus-seclab / rebus
REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.
☆25Updated 4 years ago
Alternatives and similar repositories for rebus:
Users that are interested in rebus are comparing it to the libraries listed below
- Metasploit pattern generator in Python, modified to be used as a function☆25Updated 9 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- POLAR☆73Updated 6 years ago
- Network and USB protocol fuzzing toolkit.☆35Updated 7 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 7 years ago
- Configuration security audit framework☆23Updated 8 years ago
- CTF & practice exploit collection☆38Updated 8 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆50Updated 6 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Memory forensics of virtualization environments☆46Updated 10 years ago
- ActionScript3 dynamic instrumentation tool☆36Updated 7 years ago
- IRMA ansible☆24Updated 8 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago
- Certificate Expiration Monitor script☆27Updated 6 years ago
- Binary Ninja Posters☆35Updated 4 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- ☆15Updated 6 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated 11 months ago
- Fuzzer☆43Updated 10 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- Malware analysis using Docker project☆25Updated 8 years ago
- ☆12Updated 7 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- ☆50Updated 12 years ago
- Synesthesia, implemented as Yices scripts☆93Updated 7 years ago
- Memory awesomeness.☆29Updated 9 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago