devwerks / Static-Malware-Analyses
A open source Python script to perform static analysis on a Malware Binary File (portable executable).
☆16Updated 9 years ago
Alternatives and similar repositories for Static-Malware-Analyses:
Users that are interested in Static-Malware-Analyses are comparing it to the libraries listed below
- ☆10Updated 3 months ago
- ☆14Updated 9 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Updated 7 years ago
- Packed Malware Analyzer (PACKMAN)☆12Updated 9 years ago
- Misc Python tools or PoCs. Mainly focused in helping RE, fuzzing☆20Updated 12 years ago
- ☆42Updated 6 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Malware analyses and helpful scripts☆29Updated 2 years ago
- ☆27Updated 3 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Win32 Shellcodes☆9Updated 7 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- ☆28Updated 7 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Binary Analysis Platform☆74Updated 11 years ago
- A virtual PDF analysis framework☆17Updated 11 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 10 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Static and automated/dynamic malware analysis☆47Updated 9 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Updated 7 years ago
- Static and Dynamic Analysis Added☆9Updated 8 years ago
- ☆32Updated 10 months ago
- A Single Library Parser to extract meta information,static analysis and detect macros within the files.☆1Updated 6 years ago
- r2yara - Module for Yara using radare2 information☆34Updated last year
- Exploit Reliability Testing System☆34Updated 10 years ago
- A collection of Volatility Framework plugins.☆26Updated 11 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 10 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 8 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago