Web based code browser using clang to provide basic code analysis.
☆46Jul 20, 2017Updated 8 years ago
Alternatives and similar repositories for codebro
Users that are interested in codebro are comparing it to the libraries listed below
Sorting:
- Repository for proxenet plugins☆14Jun 14, 2016Updated 9 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 4 years ago
- Yara rules for detecting malware☆23Sep 9, 2025Updated 6 months ago
- Parses Java Cache IDX files☆40Feb 28, 2018Updated 8 years ago
- Code Search on Fess☆11Nov 2, 2024Updated last year
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Aug 5, 2017Updated 8 years ago
- My conference presentations and publications☆26Feb 24, 2022Updated 4 years ago
- Sublime Malware Research Tool☆66Oct 28, 2024Updated last year
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- Assorted pintools☆30Mar 30, 2020Updated 5 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆29May 23, 2023Updated 2 years ago
- Frida plugin for Binary Ninja☆20Jan 12, 2025Updated last year
- Artifact for the OOPSLA 17 DejaVu Paper☆10Jul 26, 2017Updated 8 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Sep 12, 2016Updated 9 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- REIL translation library☆36May 6, 2016Updated 9 years ago
- Plugin for IDA Pro to convert assembler to LLVM IR☆20Nov 15, 2016Updated 9 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆221Nov 29, 2016Updated 9 years ago
- Unsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest☆227Aug 28, 2024Updated last year
- OS X rootkit loader version #2☆12Apr 9, 2015Updated 10 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated 11 months ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆18Sep 10, 2023Updated 2 years ago
- A monitoring script for AFL☆41Feb 8, 2017Updated 9 years ago
- S2E Core Engine Library☆15Jan 7, 2020Updated 6 years ago
- An HTTP proxy that enables access to Tor Onion Services☆17Dec 16, 2021Updated 4 years ago
- IDA (sort of) headless☆27Feb 17, 2024Updated 2 years ago
- Lite version of PDF X-RAY that uses no backend☆38Nov 11, 2011Updated 14 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆171Jul 7, 2018Updated 7 years ago
- An ICAP Server with yara scanner for URL and content.☆58Dec 19, 2024Updated last year
- Parallel APK analyzer☆51Jan 10, 2017Updated 9 years ago
- 'SWEETMON2' is a fuzzer monitoring service based Python3 + Django2. User can manage their fuzzers and crashes on the web. It can reduce r…☆10Jun 5, 2020Updated 5 years ago
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆37Feb 24, 2016Updated 10 years ago
- Dockerised Version of Frida☆21May 10, 2023Updated 2 years ago