endgameinc / xoriLinks
Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode
☆728Updated 2 years ago
Alternatives and similar repositories for xori
Users that are interested in xori are comparing it to the libraries listed below
Sorting:
- rVMI - A New Paradigm For Full System Analysis☆359Updated 8 years ago
- Binee: binary emulation environment☆529Updated 2 years ago
- Interactive shellcoding environment to easily craft shellcodes☆903Updated 4 years ago
- Conference slides and White-papers☆359Updated 5 years ago
- Various snippets created during malware analysis☆459Updated last month
- Collaborative malware analysis framework☆378Updated 6 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,046Updated 4 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆342Updated 7 years ago
- Code written as part of our various malware investigations☆406Updated 10 months ago
- Malware Configuration And Payload Extraction☆759Updated last year
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,679Updated last year
- A static analyzer for PE executables.☆1,091Updated last year
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆411Updated 5 years ago
- OPCDE Cybersecurity Conference Materials☆619Updated 5 years ago
- random brain dumps☆350Updated 8 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆273Updated 4 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆476Updated 4 years ago
- Open source offensive security platform for red team, by red team.☆387Updated 8 years ago
- Linux bind shell with anti-reverse engineering techniques☆287Updated 8 years ago
- Official repository for Pyew.☆391Updated 6 years ago
- A series of tutorials about radare2 framework from https://www.megabeets.net☆528Updated 4 years ago
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆289Updated 2 years ago
- Process Spawn Control is a Powershell tool which aims to help in the behavioral (process) analysis of malware. PsC suspends newly launche…☆264Updated 3 years ago
- Pattern Extractor for Obfuscated Code☆300Updated 3 years ago
- ☆351Updated 10 years ago
- PEframe is a open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents.☆617Updated 3 years ago
- A portable reverse engineering environment using docker.☆214Updated 7 years ago
- ☆978Updated 2 months ago
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.☆232Updated last year
- C++ application that uses memory and code hooks to detect packers☆272Updated 7 years ago