mandiant / rvmiLinks
rVMI - A New Paradigm For Full System Analysis
☆357Updated 7 years ago
Alternatives and similar repositories for rvmi
Users that are interested in rvmi are comparing it to the libraries listed below
Sorting:
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆287Updated 2 years ago
- Conference slides and White-papers☆358Updated 5 years ago
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.☆232Updated last year
- Collaborative malware analysis framework☆377Updated 6 years ago
- C++ application that uses memory and code hooks to detect packers☆271Updated 7 years ago
- A tool to detect and crash Cuckoo Sandbox☆295Updated last year
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆287Updated 9 years ago
- Various snippets created during malware analysis☆458Updated 3 weeks ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆270Updated 4 years ago
- BASS - BASS Automated Signature Synthesizer☆178Updated 7 years ago
- capstone based disassembler for extracting to binnavi☆229Updated 9 years ago
- ATrace is a tool for tracing execution of binaries on Windows.☆240Updated 9 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆155Updated 5 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆86Updated 8 years ago
- Linux bind shell with anti-reverse engineering techniques☆287Updated 8 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 7 years ago
- PyAna - Analyzing the Windows shellcode☆248Updated 9 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆170Updated 7 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆190Updated 9 years ago
- Official repository for Pyew.☆390Updated 6 years ago
- Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.☆506Updated last year
- Protocol Analysis/Decoder Framework☆495Updated 2 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆194Updated 8 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆159Updated 9 years ago
- The Multiplatform Linux Sandbox☆264Updated 3 years ago
- Your bag of handy codes for malware researchers☆121Updated 5 years ago
- Binee: binary emulation environment☆527Updated 2 years ago
- Decept Network Protocol Proxy☆277Updated 2 years ago
- HORSEPILL rootkit PoC☆229Updated 9 years ago
- Modified edition of cuckoo☆402Updated 7 years ago