deeso / java8-memory-analysis
☆9Updated 7 years ago
Alternatives and similar repositories for java8-memory-analysis:
Users that are interested in java8-memory-analysis are comparing it to the libraries listed below
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 6 years ago
- Random stuff for FlareOn☆13Updated 6 years ago
- Version of Binnavi used for the thesis "Finding the needle in the heap : combining binary analysis techniques to trigger use-after-free"☆10Updated 6 years ago
- My conference presentations and publications☆26Updated 2 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- Writeups of CTF challenges I do☆13Updated 5 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆30Updated 6 years ago
- ☆22Updated 6 years ago
- Misc IDA Pro scripts☆23Updated 8 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- ☆12Updated 4 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- A stateful fuzzing engine.☆46Updated 6 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- ssdeep cluster analysis for malware files☆31Updated 4 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆15Updated 7 years ago
- Scripts targeting specific families☆13Updated 7 years ago
- SDBbot Unpacker Python 2.7☆9Updated 4 years ago
- python library for dumping a linux process from memory☆34Updated 14 years ago
- Automatically generate ASM.JS JIT-Spray payloads☆36Updated 6 years ago
- reverse engineering, visual binary analysis☆24Updated 8 years ago
- POC for cve-2019-1458☆21Updated 4 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 5 years ago
- ☆16Updated 4 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 6 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Updated 5 years ago
- collection of used Tools for CTFs☆15Updated 3 years ago
- Malware analysis tool based on taint analysis.☆14Updated 3 years ago