brad-sp / cuckoomon-modifiedLinks
Modified edition of cuckoomon
☆23Updated 6 years ago
Alternatives and similar repositories for cuckoomon-modified
Users that are interested in cuckoomon-modified are comparing it to the libraries listed below
Sorting:
- Modified edition of cuckoomon☆51Updated 7 years ago
- Modified edition of cuckoo community modules☆32Updated 6 years ago
- DEPRECATED - replaced with "monitor"☆123Updated 10 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Updated 12 years ago
- ☆108Updated 8 years ago
- zer0m0n driver for cuckoo sandbox☆24Updated 10 years ago
- ☆52Updated 9 years ago
- An implementation of a generic unpacker based on Intel PIN☆28Updated 9 years ago
- Malware.lu configuration extractor☆26Updated 11 years ago
- zer0m0n driver for cuckoo sandbox☆87Updated 9 years ago
- Implementation of the DIMVA 2017 publication "Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps"☆69Updated 3 years ago
- Analysis PE file or Shellcode☆50Updated 9 years ago
- MALM: Malware Monitor☆49Updated 12 years ago
- ransomware_begone☆42Updated 9 years ago
- Modified edition of cuckoo community modules☆50Updated 8 years ago
- A collection of Yara rules I have created so far☆16Updated 5 years ago
- Malice PExecutable Plugin☆16Updated 4 years ago
- ☆36Updated 8 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 8 years ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Updated 9 years ago
- ☆75Updated 8 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Updated 10 years ago
- Imports MSDN documentation into IDA Pro☆52Updated 14 years ago
- Sublime Malware Research Tool☆66Updated last year
- Anti-AV compilation☆44Updated 12 years ago
- kernel exploitation helper class☆77Updated 9 years ago
- A few IDAPython scripts to generate class hierarchy diagrams from IDBs☆35Updated 14 years ago
- ☆30Updated 8 years ago
- Various Yara signatures (possibly to be included in a release later).☆87Updated 6 years ago
- Decodes PlugX traffic and encrypted/compressed artifacts☆39Updated 12 years ago