angelkillah / zer0m0n
zer0m0n driver for cuckoo sandbox
☆87Updated 8 years ago
Alternatives and similar repositories for zer0m0n:
Users that are interested in zer0m0n are comparing it to the libraries listed below
- Modified edition of cuckoomon☆49Updated 6 years ago
- ☆52Updated 9 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 7 years ago
- ☆42Updated 6 years ago
- ☆113Updated 8 years ago
- Script analysis tool based on Frida.re☆129Updated 7 years ago
- Smart DLL execution for malware analysis in sandbox systems☆143Updated 10 years ago
- ☆44Updated 6 years ago
- Modified edition of cuckoo community modules☆32Updated 5 years ago
- IDATACO IDA Pro Plugin☆47Updated 8 years ago
- Linux malware analysis based on Cuckoo Sandbox.☆39Updated last year
- Various Yara signatures (possibly to be included in a release later).☆86Updated 5 years ago
- Automatically exported from code.google.com/p/malware-lu☆55Updated 5 years ago
- ☆109Updated 7 years ago
- ☆91Updated 8 years ago
- Yet another Python library to read and write PE/PE+ files.☆80Updated 8 years ago
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- Extract GUIDs from .NET assemblies☆21Updated 8 years ago
- ☆134Updated 6 years ago
- Pure Python parser for Application Compatibility Shim Databases (.sdb files)☆108Updated 4 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 7 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 5 years ago
- kernel exploitation helper class☆76Updated 8 years ago
- Imports MSDN documentation into IDA Pro☆51Updated 13 years ago
- Security Research and Development Framework☆106Updated 9 years ago
- Analysis PE file or Shellcode☆49Updated 8 years ago
- Implementation of the DIMVA 2017 publication "Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps"☆70Updated 3 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆75Updated 10 years ago
- Scripts for dealing with various ek's☆69Updated 8 years ago