armadito / armadito-mod-pdfLinks
Armadito module for PDF document analysis.
☆18Updated 8 years ago
Alternatives and similar repositories for armadito-mod-pdf
Users that are interested in armadito-mod-pdf are comparing it to the libraries listed below
Sorting:
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆58Updated 8 years ago
- Web based code browser using clang to provide basic code analysis.☆46Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- ☆16Updated 9 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 10 years ago
- Packed Malware Analyzer (PACKMAN)☆12Updated 9 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- Scanner for Regin Virtual Filesystems☆26Updated 10 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- ☆32Updated last year
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆34Updated last year
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- ☆12Updated 10 years ago
- a collection of yara rules for binary analysis☆24Updated 8 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 9 years ago
- Gandcrab v5.2 decryption scripts☆16Updated 6 years ago
- POC for IAT Parsing Payloads☆48Updated 9 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 9 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 10 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆55Updated 9 years ago
- The plugin is an integration of Virus Battle API to the well known IDA Disassembler.☆20Updated 10 years ago
- Memory awesomeness.☆29Updated 10 years ago
- Lite version of PDF X-RAY that uses no backend☆38Updated 14 years ago
- All related files and slides for past talks☆44Updated 3 weeks ago
- Solutions for various crackmes☆20Updated 12 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago