bsoman3 / Meeseeks
VM setup for Malware RE labs
☆28Updated 6 years ago
Alternatives and similar repositories for Meeseeks:
Users that are interested in Meeseeks are comparing it to the libraries listed below
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆50Updated 7 years ago
- ☆21Updated 6 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 8 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆75Updated 10 years ago
- A collection of Volatility Framework plugins.☆26Updated 11 years ago
- ☆17Updated 5 years ago
- a collection of yara rules for binary analysis☆24Updated 7 years ago
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆86Updated 6 years ago
- Extract GUIDs from .NET assemblies☆21Updated 8 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 7 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Collection of my Python Scripts☆41Updated 4 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 6 years ago
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆99Updated 5 years ago
- Another Repo of Malware. Enjoy. <3☆59Updated 6 years ago
- IDATACO IDA Pro Plugin☆47Updated 8 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- Binary Ninja Posters☆35Updated 4 years ago
- Development guide for Volatility Plugins☆23Updated 7 years ago
- Personal repository for all ctf related stuffs☆67Updated 5 months ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆44Updated 8 years ago
- POLAR☆73Updated 6 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- Sublime Malware Research Tool☆66Updated 5 months ago
- Automated memory forensics analysis☆33Updated 5 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 7 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆84Updated 4 years ago
- CANAPE Network Testing Tool☆34Updated 6 years ago