moyix / panda-malrecView external linksLinks
A system to record malware using PANDA
☆45May 20, 2019Updated 6 years ago
Alternatives and similar repositories for panda-malrec
Users that are interested in panda-malrec are comparing it to the libraries listed below
Sorting:
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Collection of pin tools☆52Dec 29, 2015Updated 10 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- A symbolic execution engine for Python☆44Dec 4, 2012Updated 13 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- Analysis PE file or Shellcode☆50Jul 28, 2016Updated 9 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- ☆17Aug 4, 2014Updated 11 years ago
- Malware Behavior Analyzer☆158Jun 1, 2017Updated 8 years ago
- The plugin is an integration of Virus Battle API to the well known IDA Disassembler.☆20May 26, 2015Updated 10 years ago
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- Symbolic execution for LLVM traces produced by PANDA☆40Feb 5, 2019Updated 7 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆111Sep 12, 2022Updated 3 years ago
- ☆105Apr 20, 2015Updated 10 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- A Tool to Unpack Self-Modifying Code using DynamoRIO☆140Apr 17, 2017Updated 8 years ago
- This project uses the .NET framework to bypass Antivirus solutions.☆29Mar 24, 2013Updated 12 years ago
- ☆27Mar 1, 2022Updated 3 years ago
- Code for my blog post on using S2E for malware analysis☆25Jul 16, 2019Updated 6 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- This is a plugin for OllyDbg 1.10 to replace the old disasm engine by Capstone disassembly/disassembler framework.☆79Feb 4, 2015Updated 11 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- ☆12Jun 8, 2021Updated 4 years ago
- Bro is a powerful network analysis framework that is much different from the typical IDS you may know. Official mirror of git.bro.org/br…☆10Aug 16, 2014Updated 11 years ago
- QTrace, a "zero knowledge" system call tracer☆54Jan 3, 2015Updated 11 years ago
- PHP obfuscator written in Javascript.☆14Oct 8, 2021Updated 4 years ago
- Bypass Antivm and Cuckoo Sandbox Techniques☆12Oct 12, 2016Updated 9 years ago
- Timeless debugging with symbolic execution and processor trace☆75Jan 23, 2021Updated 5 years ago
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- Return Oriented Programme Evolution with ROPER☆171Apr 25, 2019Updated 6 years ago