buffer / pylibemu
A Libemu Cython wrapper
☆125Updated 9 months ago
Related projects: ⓘ
- ☆88Updated this week
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆85Updated 7 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆125Updated 9 years ago
- PyAna - Analyzing the Windows shellcode☆246Updated 8 years ago
- Python bindings for ssdeep☆91Updated 2 years ago
- A system to record malware using PANDA☆42Updated 5 years ago
- zer0m0n driver for cuckoo sandbox☆87Updated 8 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆148Updated 6 years ago
- ☆141Updated this week
- Simple shellcode decoder using unicorn-engine☆98Updated 8 years ago
- Sublime Malware Research Tool☆64Updated 3 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆168Updated 6 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆192Updated 7 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆65Updated 7 years ago
- x86 emulation and shellcode detection☆138Updated 5 months ago
- Certified Edible Dinosaurs official CTF toolkit☆121Updated 6 years ago
- Automated malware unpacker☆118Updated 8 years ago
- Hodor! Fuzzer..☆126Updated 8 years ago
- Yet another Python library to read and write PE/PE+ files.☆80Updated 7 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- ☆49Updated 9 years ago
- ☆111Updated 7 years ago
- A Yara rule generator for finding related samples and hunting☆155Updated 2 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- Scalable Binary Data Extraction in Hadoop☆143Updated 10 years ago
- Small tool for disassembling shellcode (using objdump)☆146Updated 2 years ago
- A clone (of the basic core) of AFL fuzzer☆74Updated 8 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆191Updated 8 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆131Updated 8 years ago
- Automated Exploit generation with WinDBG☆187Updated 7 years ago