cyber-itl / citl-static-analysisLinks
CITL's static analysis engine for native code artifacts
☆20Updated 4 years ago
Alternatives and similar repositories for citl-static-analysis
Users that are interested in citl-static-analysis are comparing it to the libraries listed below
Sorting:
- ☆64Updated last year
- Cockroach is your primitive & immortal swiss army knife.☆49Updated 3 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- Client library for the mwdb service by CERT Polska.☆40Updated last month
- Conferences, tools, papers, etc.☆43Updated 2 months ago
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- p…☆131Updated this week
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆21Updated 3 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- The Dumb Network Fuzzer☆21Updated 2 years ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆161Updated last year
- Data to test capa's code and rules.☆42Updated this week
- ☆47Updated 5 years ago
- A collection of my reverse engineering and malware analysis write-ups☆20Updated 4 years ago
- Set of tools to analyze Tinynuke samples☆15Updated 3 years ago
- Code snippets for Qiling Tutorials☆21Updated 5 years ago
- MSR Project Freta☆77Updated last year
- Radare2 Metadata Extraction to Elasticsearch☆23Updated last year
- ☆20Updated 3 years ago
- Public repository for Red Canary Research☆36Updated 4 years ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆57Updated 3 months ago
- Commandline utility to interact with the Malpedia service☆22Updated 5 years ago
- This tool gives you the Linux system call number (32bit and 64bit x86) for a system call name (e.g., read, write, ...).☆26Updated last year
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- Tools for inspecting YARA bytecode☆20Updated 5 years ago
- unofficial fork of inetsim - official source at http://www.inetsim.org/ - changes in branch "pimped"☆30Updated 9 years ago
- ☆37Updated 4 years ago
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆21Updated last week
- ☆20Updated 4 years ago