endgameinc / xoriView external linksLinks
Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode
☆728Jan 25, 2023Updated 3 years ago
Alternatives and similar repositories for xori
Users that are interested in xori are comparing it to the libraries listed below
Sorting:
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆742Mar 17, 2019Updated 6 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆185Mar 30, 2019Updated 6 years ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,679Feb 14, 2024Updated 2 years ago
- Binary coverage tool without binary modification for Windows☆446Aug 12, 2020Updated 5 years ago
- A project that aims to automatically devirtualize code that has been virtualized using x86virt☆126Dec 3, 2022Updated 3 years ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆280Dec 13, 2021Updated 4 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆310Feb 24, 2019Updated 6 years ago
- A Coverage Explorer for Reverse Engineers☆2,491Jul 18, 2024Updated last year
- Binary Analysis Framework in Rust☆581Jan 22, 2024Updated 2 years ago
- Various snippets created during malware analysis☆465Oct 3, 2025Updated 4 months ago
- idenLib - Library Function Identification [This project is not maintained anymore]☆395Mar 17, 2019Updated 6 years ago
- Binee: binary emulation environment☆530Feb 25, 2023Updated 2 years ago
- A static analyzer for PE executables.☆1,104Jan 30, 2026Updated 2 weeks ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,612Dec 10, 2018Updated 7 years ago
- Virtual Machine Introspection, Tracing & Debugging☆595Feb 22, 2022Updated 3 years ago
- Automated static analysis tools for binary programs☆1,669Dec 18, 2025Updated last month
- Interactive shellcoding environment to easily craft shellcodes☆907Feb 26, 2021Updated 4 years ago
- ☆349Mar 19, 2021Updated 4 years ago
- Set of tools to analyze Windows sandboxes for exposed attack surface.☆2,262Nov 6, 2025Updated 3 months ago
- A sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research☆468Apr 10, 2023Updated 2 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆305Jan 2, 2023Updated 3 years ago
- Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free…☆1,844Feb 25, 2025Updated 11 months ago
- ☆226May 1, 2023Updated 2 years ago
- Some C++ example code to demonstrate how to perform code similarity searches using SimHashing.☆559Jun 24, 2020Updated 5 years ago
- The Kam1n0 Assembly Analysis Platform☆625Mar 2, 2023Updated 2 years ago
- DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the D…☆835Nov 19, 2024Updated last year
- A fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer☆344Aug 23, 2019Updated 6 years ago
- Binary analysis and management framework☆1,557Jun 7, 2023Updated 2 years ago
- A function tracer☆92Jun 4, 2019Updated 6 years ago
- YaCo is an Hex-Rays IDA plugin. When enabled, multiple users can work simultaneously on the same binary. Any modification done by any use…☆324Aug 5, 2019Updated 6 years ago
- SMDA is a minimalist recursive disassembler library that is optimized for accurate Control Flow Graph (CFG) recovery from memory dumps.☆252Jan 16, 2026Updated 3 weeks ago
- Converts a DLL into EXE☆820Jul 23, 2023Updated 2 years ago
- Robber is open source tool for finding executables prone to DLL hijacking☆785Jun 23, 2022Updated 3 years ago
- Kaspersky's GReAT KLara☆730Jul 24, 2024Updated last year
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆184Oct 5, 2020Updated 5 years ago
- Platform for Architecture-Neutral Dynamic Analysis☆2,718Feb 4, 2026Updated last week
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,553Oct 31, 2025Updated 3 months ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,877Feb 3, 2026Updated last week