conix-security / machoke
☆51Updated 6 years ago
Alternatives and similar repositories for machoke:
Users that are interested in machoke are comparing it to the libraries listed below
- Hansel - a simple but flexible search for IDA☆26Updated 5 years ago
- ☆23Updated 5 years ago
- A python script that can be used to scan data within in an IDB using Yara.☆22Updated 6 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 6 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 5 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 6 years ago
- Binary Ninja Posters☆35Updated 4 years ago
- a modified version base on Tracecorn☆20Updated 5 years ago
- ☆26Updated 10 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆88Updated 5 years ago
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆74Updated 3 years ago
- ☆32Updated 7 months ago
- A Python tool to generate ROP chains☆60Updated 2 weeks ago
- IDARay is an IDA Pro plugin that matches the database against multiple YARA files which themselves may contain multiple rules.☆18Updated 6 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 7 years ago
- Analysis PE file or Shellcode☆49Updated 8 years ago
- Automated library compilation and PDB annotation with CMake and IDA Pro☆20Updated 6 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- pyGoRE - Python library for analyzing Go binaries☆64Updated 3 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆74Updated 10 years ago
- Flare-On solutions☆36Updated 5 years ago
- ☆67Updated last year
- ☆39Updated 3 years ago
- TA505 unpacker Python 2.7☆47Updated 4 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆40Updated 5 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆39Updated 5 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆86Updated 7 years ago
- ☆33Updated 9 years ago
- Parsers for custom malware formats ("Funky malware formats")☆93Updated 3 years ago