Malware diversity
☆51Dec 2, 2015Updated 10 years ago
Alternatives and similar repositories for MalDiv
Users that are interested in MalDiv are comparing it to the libraries listed below
Sorting:
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆16Apr 17, 2017Updated 8 years ago
- ☆14Feb 18, 2021Updated 5 years ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Dec 21, 2018Updated 7 years ago
- Sandbox d'analyse de malware pour Windows 7 avec un client TCP en mode noyau☆19Feb 23, 2016Updated 10 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Class to help with adding logging function in smali output from 3rd party Android apps.☆10May 20, 2014Updated 11 years ago
- A unofficial Docker image for build snaps☆11Jun 11, 2019Updated 6 years ago
- A 2D maze solver☆26Apr 8, 2015Updated 10 years ago
- Reverse Engineering tool for Ethereum EVM☆20Jun 30, 2016Updated 9 years ago
- A suite of simple programs to test Intels' TSX extension☆14May 13, 2017Updated 8 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- Transactional memory (mostly Intel® TSX) experiments☆14May 3, 2014Updated 11 years ago
- X86 Instruction Profiler☆13May 19, 2014Updated 11 years ago
- Operating system demonstrating system transactions☆17Apr 19, 2017Updated 8 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- A simple js_of_ocaml workflow with Reason and esy☆16Dec 11, 2022Updated 3 years ago
- Data-flow Analysis Visualizer☆10Dec 9, 2021Updated 4 years ago
- Js_of_ocaml bindings for the p5.js library☆11May 14, 2024Updated last year
- funky fun fuzzer☆11Jul 6, 2021Updated 4 years ago
- Url safe slug generator for OCaml☆16Jul 19, 2021Updated 4 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- New Cache implementation using Gem5☆13Apr 2, 2014Updated 11 years ago
- Factored Interactive POMDP solver based on symbolic Perseus.☆11Aug 12, 2025Updated 7 months ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 3 years ago
- A Benchmark Suite for Real-Time Robotics☆12May 3, 2023Updated 2 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- FlipIt: An LLVM Based Fault Injector for HPC☆14May 14, 2021Updated 4 years ago
- PIN-based Fault-Injector is a fault injector based on the Intel PIN tool. For more information, please refer to the following paper:☆18Jul 6, 2018Updated 7 years ago
- OCaml bindings to the Spotify web API☆17Oct 24, 2020Updated 5 years ago
- This adds partial support of AVX2 and AVX-512 to gem5.☆15Dec 19, 2023Updated 2 years ago
- spy windows ce API calls☆11Jun 3, 2014Updated 11 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆24Nov 12, 2019Updated 6 years ago
- libdft for win☆51Jul 8, 2013Updated 12 years ago
- PoC code for android RCE with multidex and ZIP files☆40Feb 1, 2016Updated 10 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- ☆39Sep 27, 2022Updated 3 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago