alrawi / badthings-tools
This repository contains dynamic and static tools for IoT malware analysis
☆21Updated 2 years ago
Alternatives and similar repositories for badthings-tools
Users that are interested in badthings-tools are comparing it to the libraries listed below
Sorting:
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆41Updated 9 months ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆28Updated last year
- ☆14Updated 2 years ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆44Updated 2 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- The malsource dataset☆10Updated 3 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆28Updated 2 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆86Updated 10 months ago
- Code for UI, backend, engine and statistical analysis for RE☆22Updated 3 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 4 years ago
- ☆58Updated 4 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆32Updated 2 years ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆114Updated 2 months ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆93Updated 2 weeks ago
- Robust Automated Malware Unpacker☆84Updated 2 years ago
- ☆24Updated 2 years ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 4 years ago
- ☆11Updated 5 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 8 years ago
- My conference presentations and Materials for them.☆32Updated 2 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆46Updated 5 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆72Updated 3 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆15Updated 8 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆25Updated last year
- Dataset of packed ELF samples☆19Updated 2 years ago
- SAFE embeddings to match functions in yara☆100Updated 5 years ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆43Updated 2 years ago
- ☆43Updated 7 years ago