mandiant / rvmi
rVMI - A New Paradigm For Full System Analysis
☆353Updated 7 years ago
Alternatives and similar repositories for rvmi:
Users that are interested in rvmi are comparing it to the libraries listed below
- Conference slides and White-papers☆356Updated 5 years ago
- Collaborative malware analysis framework☆376Updated 5 years ago
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆281Updated last year
- C++ application that uses memory and code hooks to detect packers☆270Updated 6 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆285Updated 8 years ago
- Various snippets created during malware analysis☆458Updated 2 years ago
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.☆229Updated last year
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆195Updated 7 years ago
- A tool to detect and crash Cuckoo Sandbox☆289Updated 5 months ago
- BASS - BASS Automated Signature Synthesizer☆173Updated 6 years ago
- HORSEPILL rootkit PoC☆224Updated 8 years ago
- ATrace is a tool for tracing execution of binaries on Windows.☆236Updated 8 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆169Updated 6 years ago
- capstone based disassembler for extracting to binnavi☆227Updated 8 years ago
- Protocol Analysis/Decoder Framework☆490Updated 2 years ago
- Modified edition of cuckoo☆395Updated 7 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆148Updated 7 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆264Updated 3 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆154Updated 5 years ago
- Decept Network Protocol Proxy☆274Updated last year
- Linux bind shell with anti-reverse engineering techniques☆285Updated 7 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆86Updated 7 years ago
- The Multiplatform Linux Sandbox☆261Updated 3 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆156Updated 8 years ago
- Small tool for generating ropchains using unicorn and z3☆197Updated 6 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆300Updated 4 years ago
- PyAna - Analyzing the Windows shellcode☆247Updated 8 years ago
- snake - a malware storage zoo☆217Updated last year