marcusbotacin / Malware.VariantsLinks
Additional material for the malware variants identification paper
☆9Updated 5 years ago
Alternatives and similar repositories for Malware.Variants
Users that are interested in Malware.Variants are comparing it to the libraries listed below
Sorting:
- Exploits for YARA 3.7.1 & 3.8.1☆31Updated 6 years ago
- SDBbot Unpacker Python 2.7☆9Updated 4 years ago
- 🐧 A simple kernel-level rootkit☆20Updated 9 years ago
- ssdeep cluster analysis for malware files☆30Updated 5 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- My conference presentations and publications☆26Updated 3 years ago
- CAPE monitor DLLs☆41Updated 5 years ago
- Using SEH to bypass CFG☆29Updated 8 years ago
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 7 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Updated 7 years ago
- Static analysis tools for x86 assembly☆13Updated 8 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- Static and Dynamic Analysis Added☆9Updated 8 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- ☆43Updated 6 years ago
- Slides of 44Con 2018☆21Updated 6 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- Framework complet d'analyse de malware☆12Updated 9 years ago
- Scripts targeting specific families☆13Updated 7 years ago
- Automatically generate ASM.JS JIT-Spray payloads☆36Updated 7 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago
- Version of Binnavi used for the thesis "Finding the needle in the heap : combining binary analysis techniques to trigger use-after-free"☆10Updated 7 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Updated 7 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 5 years ago
- ☆13Updated 7 years ago
- Hansel - a simple but flexible search for IDA☆25Updated 5 years ago
- Malware analyses and helpful scripts☆29Updated 3 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago