buffer / pylibemuLinks
A Libemu Cython wrapper
☆128Updated last year
Alternatives and similar repositories for pylibemu
Users that are interested in pylibemu are comparing it to the libraries listed below
Sorting:
- ☆52Updated 10 years ago
- Sublime Malware Research Tool☆66Updated 11 months ago
- A system to record malware using PANDA☆44Updated 6 years ago
- IDATACO IDA Pro Plugin☆47Updated 9 years ago
- Python bindings for ssdeep☆90Updated 3 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago
- Yet another Python library to read and write PE/PE+ files.☆78Updated 9 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 8 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 9 years ago
- PyAna - Analyzing the Windows shellcode☆247Updated 9 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Malware.lu tools☆63Updated 11 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 10 years ago
- Imports MSDN documentation into IDA Pro☆51Updated 13 years ago
- ☆43Updated 7 years ago
- ActionScript3 dynamic instrumentation tool☆36Updated 8 years ago
- ☆50Updated 12 years ago
- Scalable Binary Data Extraction in Hadoop☆143Updated 11 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Updated 8 years ago
- ☆108Updated 8 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Updated 5 years ago
- Small tool for disassembling shellcode (using objdump)☆149Updated 3 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 8 years ago
- a collection of public yara rules☆25Updated 5 years ago
- Patching Flash binary to stop Flash exploits and zero-days☆62Updated 8 years ago
- A Python, client/server, mutation-based file fuzzer that uses PyDBG to monitor the target application. Check out the README for full deta…☆49Updated 9 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Updated 9 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆86Updated 8 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Updated 9 years ago
- Static and automated/dynamic malware analysis☆47Updated 10 years ago