devwerks / Static-Malware-Analyses
A open source Python script to perform static analysis on a Malware Binary File (portable executable).
☆16Updated 9 years ago
Alternatives and similar repositories for Static-Malware-Analyses:
Users that are interested in Static-Malware-Analyses are comparing it to the libraries listed below
- Static and Dynamic exploit analysis framework.☆22Updated 10 years ago
- Win32 Shellcodes☆9Updated 7 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- ☆10Updated 2 months ago
- Misc Python tools or PoCs. Mainly focused in helping RE, fuzzing☆20Updated 12 years ago
- Malware analyses and helpful scripts☆29Updated 2 years ago
- ☆32Updated 9 months ago
- simple rootkit for computer security class☆14Updated 12 years ago
- ☆14Updated 9 years ago
- Various Malware-Related Utilities☆10Updated 8 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- a collection of yara rules for binary analysis☆24Updated 7 years ago
- Static and Dynamic Analysis Added☆9Updated 8 years ago
- Memory forensics of virtualization environments☆46Updated 10 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Updated 7 years ago
- A malware sandoxed with gdb☆15Updated 8 years ago
- Python OpenIOC Editor☆17Updated 9 years ago
- Malware.lu configuration extractor☆24Updated 11 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Updated 6 years ago
- Anti live forensic linux LKM rootkit☆17Updated 7 years ago
- Analysis PE file or Shellcode☆49Updated 8 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- API functions for Malware Research☆35Updated 5 years ago
- Static and automated/dynamic malware analysis☆47Updated 9 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 8 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- ☆28Updated 7 years ago