koike / ayumi
☆11Updated this week
Related projects: ⓘ
- Analyzing Rig Exploit Kit☆50Updated 7 years ago
- Simple high-interactive client honeypot☆24Updated 6 years ago
- Past presentation materials☆10Updated 6 years ago
- Malware Dynamic Analysis Platform enhanced Cuckoo Sandbox☆24Updated 6 years ago
- ☆34Updated this week
- PEDAL - Python Exploit Development Assistance for GDB Lite☆34Updated 4 years ago
- Automated Memory Analysis (Black Hat Arsenal 2014)☆32Updated 10 years ago
- Tool for dropping malware from EK☆41Updated 6 years ago
- Application for STIX v2.0 objects management and analysis☆27Updated 6 years ago
- ☆19Updated 6 years ago
- Analysis PE file or Shellcode☆48Updated 8 years ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆105Updated last year
- IDATACO IDA Pro Plugin☆47Updated 8 years ago
- Test suite for bypassing Malware sandboxes.☆38Updated 9 years ago
- ☆11Updated this week
- simple plugin to detect shellcode on Bro IDS with Unicorn☆34Updated 7 years ago
- ActionScript3 dynamic instrumentation tool☆36Updated 7 years ago
- ASERT shared scripts for reversing☆32Updated 6 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆34Updated 8 years ago
- A tool to generate yara signatures from function blocks☆19Updated 9 years ago
- Malware.lu tools☆63Updated 10 years ago
- ☆15Updated this week
- ☆26Updated this week
- ☆16Updated 7 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- ☆27Updated this week
- CTF & practice exploit collection☆38Updated 7 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Updated 6 years ago
- A collection of YARA signatures that I have found around the web.☆10Updated 8 years ago
- Frontend for Codex Gigas☆21Updated 7 years ago