corkami / corkami.github.ioLinks
Website
☆21Updated 2 years ago
Alternatives and similar repositories for corkami.github.io
Users that are interested in corkami.github.io are comparing it to the libraries listed below
Sorting:
- Conference slides and White-papers☆360Updated 6 years ago
- ☆453Updated last year
- A boot record parser that identifies known good signatures for MBR, VBR and IPL.☆95Updated 11 months ago
- The kernel patch and userspace tools to enable Linux software write blocking☆152Updated 5 years ago
- rVMI - A New Paradigm For Full System Analysis☆359Updated 8 years ago
- Public Profile Repository for Rekall Memory Forensic.☆101Updated 5 years ago
- Various snippets created during malware analysis☆464Updated 4 months ago
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆294Updated 2 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆86Updated 8 years ago
- Assesses CPU security of embedded devices. #nsacyber☆141Updated 9 years ago
- Differential Analysis of Malware in Memory☆215Updated 8 years ago
- Decept Network Protocol Proxy☆279Updated 3 years ago
- documentations, slides decks...☆823Updated last year
- Yara rules for malware families seen as part of targeted threats project☆142Updated 9 years ago
- Linux bind shell with anti-reverse engineering techniques☆291Updated 8 years ago
- Code written as part of our various malware investigations☆409Updated 2 months ago
- Your bag of handy codes for malware researchers☆120Updated 5 years ago
- Supporting data for BAD TRAFFIC Citizen Lab report.☆23Updated 7 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- Cross-platform, open-source shellbag parser☆160Updated 3 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Updated 6 years ago
- A tool to retrieve malware directly from the source for security researchers.☆564Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- Collaborative malware analysis framework☆380Updated 7 years ago
- Explosive Steganography tools and presentation (as given at the HOPE number 9 conference)☆20Updated 11 years ago
- Malware static analysis framework☆184Updated 5 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- A repository of tools and scripts related to malware analysis☆252Updated 9 years ago
- Database of private SSL/SSH keys for embedded devices☆269Updated last year
- Simulates enough of a Telnet connection in order to log failed login attempts.☆244Updated 8 years ago