Deprecated repo for PANDA 1.0 – see PANDA 2.0 repository
☆107Dec 17, 2016Updated 9 years ago
Alternatives and similar repositories for panda
Users that are interested in panda are comparing it to the libraries listed below
Sorting:
- Platform for Architecture-Neutral Dynamic Analysis☆2,726Feb 14, 2026Updated last month
- A system to record malware using PANDA☆45May 20, 2019Updated 6 years ago
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 9 years ago
- C++ wrapper around KLEE and AFL for intelligent, coverage guided fuzzing. Developed while doing research at MWR Infosecurity☆18Aug 1, 2018Updated 7 years ago
- Collection of pin tools☆52Dec 29, 2015Updated 10 years ago
- Seeding fuzzers with symbolic execution☆203Oct 20, 2017Updated 8 years ago
- PIITracker: Automatic Tracking of Personally Identifiable Information in Windows☆20Apr 1, 2018Updated 7 years ago
- ☆85Apr 17, 2020Updated 5 years ago
- WinHeap Explorer repository.☆119Aug 27, 2018Updated 7 years ago
- KLEE-TAINT - Klee with taint analysis support☆71Oct 23, 2017Updated 8 years ago
- DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the D…☆838Nov 19, 2024Updated last year
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Jan 2, 2020Updated 6 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago
- Web based code browser using clang to provide basic code analysis.☆46Jul 20, 2017Updated 8 years ago
- Bootkits Revisited☆39Jun 3, 2014Updated 11 years ago
- Peach Pit for HTTP/2 Targeting Microsoft Edge☆63Dec 23, 2016Updated 9 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆265Jan 13, 2026Updated 2 months ago
- Yet another IDA Pro real time syncing plugin☆16Mar 27, 2018Updated 7 years ago
- ☆387Oct 28, 2019Updated 6 years ago
- The Binary Mutation code based on Uroboros☆14Feb 20, 2019Updated 7 years ago
- QEMU with rVMI extensions☆25Jul 25, 2017Updated 8 years ago
- Gives tainting information for the provided bitcode file generated from binary.☆44Sep 27, 2017Updated 8 years ago
- ☆55Mar 30, 2020Updated 5 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- ☆90Jul 5, 2016Updated 9 years ago
- Anti-AV compilation☆44Oct 4, 2013Updated 12 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Mar 20, 2017Updated 9 years ago
- Configurable instrumentation of LLVM bitcode☆35Mar 31, 2025Updated 11 months ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Nov 3, 2015Updated 10 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Jun 13, 2021Updated 4 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆65Nov 4, 2012Updated 13 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Dec 12, 2014Updated 11 years ago
- IDA Pro plugin to assist with complex graphs☆322Apr 10, 2023Updated 2 years ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,682Feb 14, 2024Updated 2 years ago
- Windows平台下的细粒度污点分析工具☆49Mar 16, 2017Updated 9 years ago
- ☆10Sep 29, 2019Updated 6 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Feb 27, 2018Updated 8 years ago