airbus-seclab / rebus
REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.
☆25Updated 4 years ago
Alternatives and similar repositories for rebus:
Users that are interested in rebus are comparing it to the libraries listed below
- POLAR☆73Updated 6 years ago
- IRMA ansible☆24Updated 8 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 7 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆25Updated 9 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 5 years ago
- ☆14Updated 4 years ago
- Memory forensics of virtualization environments☆46Updated 10 years ago
- Configuration security audit framework☆23Updated 8 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 6 years ago
- Network and USB protocol fuzzing toolkit.☆35Updated 7 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- A tool to retrieve malware directly from the source for security researchers.☆39Updated 7 years ago
- ☆24Updated 9 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Updated 5 years ago
- ActionScript3 dynamic instrumentation tool☆36Updated 8 years ago
- yara rules for crypto detection☆30Updated 10 years ago
- ☆26Updated 8 years ago
- lte security☆41Updated 9 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- NCC Code Navigator☆54Updated 8 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Collection of scripts for radare2☆28Updated 6 years ago
- Conferences, tools, papers, etc.☆43Updated last month