ehabhussein / ollydbg-binary-execution-visualizer
reverse engineering, visual binary analysis
β24Updated 8 years ago
Alternatives and similar repositories for ollydbg-binary-execution-visualizer:
Users that are interested in ollydbg-binary-execution-visualizer are comparing it to the libraries listed below
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.β10Updated 8 years ago
- simple rootkit for computer security classβ14Updated 12 years ago
- π§ A simple kernel-level rootkitβ20Updated 9 years ago
- Static analysis tools for x86 assemblyβ13Updated 8 years ago
- An IDA Pro script for creating a clearer idb for nymaim malwareβ10Updated 7 years ago
- β28Updated 7 years ago
- Malware analyses and helpful scriptsβ29Updated 2 years ago
- Shellcode tracerβ15Updated 8 years ago
- β13Updated 7 years ago
- β16Updated 7 years ago
- Will try to put here slides from now on when I give a talkβ24Updated 3 years ago
- My manual analysis of malware familiesβ13Updated 7 years ago
- β12Updated 7 years ago
- β10Updated 3 months ago
- Linux-KVM with rVMI extensionsβ22Updated 7 years ago
- Regular expression Search on the command-lineβ16Updated 3 weeks ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )β10Updated 9 years ago
- Framework complet d'analyse de malwareβ12Updated 9 years ago
- Experimental Windows .text section Patch Detectorβ21Updated 10 years ago
- Get a list of installed software in a safe mannerβ11Updated 7 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.β13Updated 4 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)β22Updated 5 years ago
- it's a simple LKM rootkit.β12Updated 8 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the β¦β10Updated 9 years ago
- A wrapper for capstone for bearparserβ14Updated 2 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windowsβ28Updated 7 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any injβ¦β18Updated 7 years ago
- Exception detector for windows programs(x86 only)β11Updated 8 years ago
- A tool evaluates security configurations of a given PE based on SDL without source codeβ14Updated 10 years ago
- IDA WhatAPIs PlugInβ7Updated 9 years ago