Automated Memory Analysis (Black Hat Arsenal 2014)
☆32Aug 4, 2014Updated 11 years ago
Alternatives and similar repositories for MemoryAnalysis
Users that are interested in MemoryAnalysis are comparing it to the libraries listed below
Sorting:
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Apr 13, 2015Updated 10 years ago
- Binary Analysis Platform☆74Oct 21, 2013Updated 12 years ago
- This project uses the .NET framework to bypass Antivirus solutions.☆29Mar 24, 2013Updated 12 years ago
- Similarity Analysis to Defeat Malware Compiler Variations☆25Oct 3, 2017Updated 8 years ago
- A Multithread PcapNG capturing tool with Hardware timestamping☆10Nov 6, 2016Updated 9 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- Fork of QEMU with Virtual Machine Introspection patches☆14Sep 13, 2023Updated 2 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- Ossec cookbook for Chef, with secure & automated key management☆21Jun 13, 2013Updated 12 years ago
- Virus Total Lookup Script☆14Aug 18, 2015Updated 10 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- ☆15Mar 2, 2014Updated 11 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- Scans a system for potential credit cards for PCI DSS compliance☆16Oct 30, 2016Updated 9 years ago
- Java hex viewer component☆20Mar 4, 2011Updated 14 years ago
- ☆11Jun 10, 2015Updated 10 years ago
- Examine, a memory leak checker on Windows☆13Jun 4, 2016Updated 9 years ago
- Simple tool to regularly pool Tor HSDirs for hidden service descriptors☆10Jul 3, 2015Updated 10 years ago
- Network Keylogger is an open source program that sends every key pressed in a computer to another computer, via TCP/IP. It can be used to…☆41Apr 25, 2011Updated 14 years ago
- Collection of my IDAPython scripts☆33Sep 17, 2015Updated 10 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- Generates random utf-8 strings for fuzz t�sting character encoding probl�ms☆11Aug 21, 2015Updated 10 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- ☆10Aug 8, 2015Updated 10 years ago
- A PE Header-Based Antivirus Tool☆11Nov 14, 2014Updated 11 years ago
- Python Malware Crawler for Zoos and Repositories☆109Apr 9, 2018Updated 7 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Zeus Gameover reverse engineering work☆16Feb 11, 2014Updated 12 years ago
- Scripts for Kali Linux☆17May 25, 2017Updated 8 years ago
- Dynamic instrumentation of the Linux kernel☆41Feb 24, 2015Updated 11 years ago
- search and collect windows files from multiple locations on machine and store in one centralized directory☆20Aug 29, 2012Updated 13 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago