mandiant / rvmi
rVMI - A New Paradigm For Full System Analysis
☆355Updated 7 years ago
Alternatives and similar repositories for rvmi:
Users that are interested in rvmi are comparing it to the libraries listed below
- Collaborative malware analysis framework☆375Updated 6 years ago
- A tool to detect and crash Cuckoo Sandbox☆293Updated 8 months ago
- C++ application that uses memory and code hooks to detect packers☆270Updated 7 years ago
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.☆230Updated last year
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆285Updated last year
- Conference slides and White-papers☆356Updated 5 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆264Updated 3 years ago
- Various snippets created during malware analysis☆459Updated 2 years ago
- capstone based disassembler for extracting to binnavi☆227Updated 8 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆86Updated 7 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆154Updated 5 years ago
- BASS - BASS Automated Signature Synthesizer☆174Updated 6 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 7 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆284Updated 8 years ago
- Protocol Analysis/Decoder Framework☆491Updated 2 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆170Updated 6 years ago
- ATrace is a tool for tracing execution of binaries on Windows.☆238Updated 8 years ago
- The Multiplatform Linux Sandbox☆260Updated 3 years ago
- Binee: binary emulation environment☆515Updated 2 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆194Updated 7 years ago
- Decept Network Protocol Proxy☆276Updated 2 years ago
- PyAna - Analyzing the Windows shellcode☆246Updated 9 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆191Updated 9 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆158Updated 8 years ago
- Small tool for generating ropchains using unicorn and z3☆197Updated 7 years ago
- Modified edition of cuckoo☆398Updated 7 years ago
- HORSEPILL rootkit PoC☆226Updated 8 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆314Updated 7 years ago
- ☆109Updated 7 years ago
- Automated malware unpacker☆119Updated 9 years ago