joxeankoret / pyavastLinks
Python bindings for Avast antivirus server version for Linux
☆15Updated 11 years ago
Alternatives and similar repositories for pyavast
Users that are interested in pyavast are comparing it to the libraries listed below
Sorting:
- Source codes for "The Antivirus Hackers Handbook" book.☆61Updated 10 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 9 years ago
- a collection of yara rules for binary analysis☆24Updated 8 years ago
- Yet another Python library to read and write PE/PE+ files.☆78Updated 9 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 5 years ago
- POC for IAT Parsing Payloads☆48Updated 9 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 7 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- A linux rootkit works on kernel 4.0.X or higher☆37Updated 9 years ago
- Replay HTTP and HTTPS requests from a PCAP based on TLS Master Secrets.☆96Updated 4 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- ☆43Updated 7 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 10 years ago
- ☆68Updated 8 years ago
- ☆16Updated 8 years ago
- Automatically exported from code.google.com/p/malware-lu☆57Updated 6 years ago
- r2yara - Module for Yara using radare2 information☆35Updated 2 years ago
- A Python parser for Rich Headers☆15Updated 10 years ago
- A virtual PDF analysis framework☆17Updated 12 years ago
- PyCommand Scripts for Immunity Debugger☆37Updated 11 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆58Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- ☆44Updated 7 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 10 years ago
- An ELF parasite command injector.☆34Updated 8 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 9 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 11 years ago
- Scalable Binary Data Extraction in Hadoop☆144Updated 11 years ago
- Rootkit☆24Updated 11 years ago