endgameinc / xoriLinks
Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode
☆727Updated 3 years ago
Alternatives and similar repositories for xori
Users that are interested in xori are comparing it to the libraries listed below
Sorting:
- rVMI - A New Paradigm For Full System Analysis☆359Updated 8 years ago
- Binee: binary emulation environment☆530Updated 2 years ago
- Interactive shellcoding environment to easily craft shellcodes☆906Updated 4 years ago
- Conference slides and White-papers☆360Updated 6 years ago
- Collaborative malware analysis framework☆380Updated 7 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,046Updated 4 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆342Updated 7 years ago
- Various snippets created during malware analysis☆463Updated 3 months ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,680Updated last year
- ☆351Updated 10 years ago
- A static analyzer for PE executables.☆1,102Updated this week
- A portable reverse engineering environment using docker.☆217Updated 7 years ago
- Official repository for Pyew.☆394Updated 6 years ago
- OPCDE Cybersecurity Conference Materials☆619Updated 5 years ago
- Linux bind shell with anti-reverse engineering techniques☆291Updated 8 years ago
- random brain dumps☆350Updated 8 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Updated 5 years ago
- Code written as part of our various malware investigations☆409Updated 2 months ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,160Updated 5 years ago
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆292Updated 2 years ago
- ☆988Updated 2 weeks ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆477Updated 4 years ago
- C++ application that uses memory and code hooks to detect packers☆274Updated 7 years ago
- Pattern Extractor for Obfuscated Code☆301Updated 3 years ago
- A series of tutorials about radare2 framework from https://www.megabeets.net☆528Updated 5 years ago
- HORSEPILL rootkit PoC☆230Updated 9 years ago
- Deprecated Binary Ninja prototype written in Python☆523Updated 5 years ago
- Malware Configuration And Payload Extraction☆761Updated last year
- PEframe is a open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents.☆619Updated 3 years ago
- Process Spawn Control is a Powershell tool which aims to help in the behavioral (process) analysis of malware. PsC suspends newly launche…☆264Updated 4 years ago