alrawi / badthings-toolsLinks
This repository contains dynamic and static tools for IoT malware analysis
☆21Updated 3 years ago
Alternatives and similar repositories for badthings-tools
Users that are interested in badthings-tools are comparing it to the libraries listed below
Sorting:
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆33Updated 2 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆43Updated last year
- ☆14Updated 3 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆87Updated last year
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 4 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆94Updated 3 weeks ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆47Updated 3 years ago
- ☆11Updated 6 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆31Updated last year
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 6 years ago
- A collection of well labeled ELF binaries compiled from benign and malicious code in various ways. Great for exploring similarity in exec…☆97Updated last year
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆115Updated 5 months ago
- Robust Automated Malware Unpacker☆85Updated 2 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Updated 4 years ago
- SAFE embeddings to match functions in yara☆100Updated 5 years ago
- Code for UI, backend, engine and statistical analysis for RE☆22Updated 4 years ago
- List of (automatic) protocol reverse engineering tools for network protocols☆168Updated last year
- Automated Yara Rule generation using Biclustering☆70Updated 4 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆27Updated last year
- Binary Code Similarity Analysis (BCSA) Tool☆123Updated 3 months ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆72Updated 3 years ago
- ☆60Updated 4 years ago
- ☆76Updated 3 years ago
- Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605☆13Updated last year
- The malsource dataset☆11Updated 3 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Updated 2 years ago
- Additional code and data for the automated malware generation paper☆13Updated last year
- ☆16Updated last year
- Symbol hash for ELF files☆112Updated 3 years ago