Automated Memory Analysis (Black Hat Arsenal 2014)
☆32Aug 4, 2014Updated 11 years ago
Alternatives and similar repositories for MemoryAnalysis
Users that are interested in MemoryAnalysis are comparing it to the libraries listed below
Sorting:
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Similarity Analysis to Defeat Malware Compiler Variations☆25Oct 3, 2017Updated 8 years ago
- Fork of QEMU with Virtual Machine Introspection patches☆14Sep 13, 2023Updated 2 years ago
- Scripts for Kali Linux☆17May 25, 2017Updated 8 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Binary Analysis Platform☆74Oct 21, 2013Updated 12 years ago
- ☆13Dec 1, 2020Updated 5 years ago
- ☆14Nov 10, 2019Updated 6 years ago
- 論文を読んだふりしてライバルに差をつけろ☆17Dec 31, 2016Updated 9 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- Implementation of the DIMVA 2017 publication "Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps"☆69Mar 7, 2022Updated 4 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Apr 13, 2015Updated 10 years ago
- rename☆19Jul 19, 2017Updated 8 years ago
- Exploit code for CVE-2016-9066☆45Mar 19, 2017Updated 9 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- This project uses the .NET framework to bypass Antivirus solutions.☆29Mar 24, 2013Updated 12 years ago
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Jul 12, 2016Updated 9 years ago
- Bit9 + Carbon Black Threat Intelligence☆81Mar 9, 2016Updated 10 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- This is a bad chat-site.☆14Dec 8, 2016Updated 9 years ago
- Python bindings for ssdeep☆90Feb 6, 2022Updated 4 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Simple tool to regularly pool Tor HSDirs for hidden service descriptors☆10Jul 3, 2015Updated 10 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Collection of my IDAPython scripts☆33Sep 17, 2015Updated 10 years ago
- Automated malware unpacker☆121Mar 5, 2016Updated 10 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- ☆36Feb 18, 2013Updated 13 years ago
- Sample Program for rust-uefi. It's running as a UEFI apps written by Rust.☆16Sep 14, 2019Updated 6 years ago
- Generates random utf-8 strings for fuzz t�sting character encoding probl�ms☆11Aug 21, 2015Updated 10 years ago
- A repository of scripts and files related to the CryptoWall version 3 threat☆12Mar 3, 2016Updated 10 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago