alexandernst / monksLinks
Procmon alternative for Linux
☆72Updated 10 years ago
Alternatives and similar repositories for monks
Users that are interested in monks are comparing it to the libraries listed below
Sorting:
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 9 years ago
- Stealth's 64bit injectso port☆74Updated 14 years ago
- Binary Ninja plugin to decompile binaries using RetDec API☆162Updated 7 years ago
- This is a plugin for OllyDbg 1.10 to replace the old disasm engine by Capstone disassembly/disassembler framework.☆79Updated 10 years ago
- Imports MSDN documentation into IDA Pro☆51Updated 13 years ago
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆39Updated 6 years ago
- sample linux x86_64 ELF virus☆53Updated 7 years ago
- This is the new ftrace (https://github.com/elfmaster/ftrace) - Much faster, better resolution but not complete yet! :)☆109Updated 6 years ago
- Download all of Microsoft's security updates and symbols☆42Updated 9 years ago
- A Reverse-Engineer's best friend.☆71Updated 7 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 9 years ago
- checksec-ng. Elf checksec in Python. Does large-scale package analysis. Now with multi-core support!☆68Updated 11 years ago
- trace local function calls like strace and ltrace☆70Updated 8 years ago
- NSIS Reversing Suite with IDA Plugins☆104Updated 2 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Updated 9 years ago
- A mutation based user mode (ring3) dumb in-memory Windows Kernel (IOCTL) Fuzzer/Logger. This script attach it self to any given process a…☆67Updated 11 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆92Updated 8 years ago
- PoC LibVMI-based GDB server for virtual machines☆53Updated 7 years ago
- ☆38Updated 12 years ago
- Malware Behavior Analyzer☆159Updated 8 years ago
- This is the python wrapper for The Security Framework SRDF☆49Updated 11 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- ☆28Updated 10 years ago
- ☆25Updated 12 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Updated 9 years ago
- ☆45Updated 7 years ago
- Set of python scripts to analyse PE32/PE64 binaries and to extract VB 5/6 headers and Visual Basic p-code functions.☆47Updated 10 years ago
- ☆39Updated 13 years ago
- ☆109Updated 8 years ago