endgameinc / xoriLinks
Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode
☆730Updated 2 years ago
Alternatives and similar repositories for xori
Users that are interested in xori are comparing it to the libraries listed below
Sorting:
- rVMI - A New Paradigm For Full System Analysis☆357Updated 7 years ago
- Interactive shellcoding environment to easily craft shellcodes☆902Updated 4 years ago
- Binee: binary emulation environment☆527Updated 2 years ago
- Conference slides and White-papers☆358Updated 5 years ago
- Various snippets created during malware analysis☆458Updated 3 weeks ago
- Collaborative malware analysis framework☆377Updated 6 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆342Updated 6 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,045Updated 4 years ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,675Updated last year
- A static analyzer for PE executables.☆1,085Updated last year
- Open source offensive security platform for red team, by red team.☆387Updated 7 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Updated 5 years ago
- A portable reverse engineering environment using docker.☆211Updated 7 years ago
- Code written as part of our various malware investigations☆403Updated 8 months ago
- Official repository for Pyew.☆390Updated 6 years ago
- A series of tutorials about radare2 framework from https://www.megabeets.net☆527Updated 4 years ago
- Malware Configuration And Payload Extraction☆762Updated 10 months ago
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆474Updated 2 years ago
- OPCDE Cybersecurity Conference Materials☆616Updated 5 years ago
- ☆973Updated last week
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆287Updated last year
- ☆350Updated 10 years ago
- C++ application that uses memory and code hooks to detect packers☆271Updated 7 years ago
- Process Spawn Control is a Powershell tool which aims to help in the behavioral (process) analysis of malware. PsC suspends newly launche…☆263Updated 3 years ago
- Your Swiss Army knife to analyze malicious web traffic based on the popular Fiddler web debugger.☆645Updated 9 months ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆476Updated 4 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆270Updated 4 years ago
- random brain dumps☆349Updated 8 years ago
- INFILTRATE 2019 Demo Materials☆339Updated 2 years ago
- Kaspersky's GReAT KLara☆713Updated last year