A system to record malware using PANDA
☆45May 20, 2019Updated 6 years ago
Alternatives and similar repositories for panda-malrec
Users that are interested in panda-malrec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Volatility plugins☆12Feb 19, 2015Updated 11 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- Analysis PE file or Shellcode☆50Jul 28, 2016Updated 9 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A Tool to Unpack Self-Modifying Code using DynamoRIO☆140Apr 17, 2017Updated 8 years ago
- Collection of pin tools☆52Dec 29, 2015Updated 10 years ago
- Symbolic execution for LLVM traces produced by PANDA☆40Feb 5, 2019Updated 7 years ago
- Malware Behavior Analyzer☆158Jun 1, 2017Updated 8 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- ☆21Mar 24, 2015Updated 11 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- A symbolic execution engine for Python☆44Dec 4, 2012Updated 13 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Deprecated repo for PANDA 1.0 – see PANDA 2.0 repository☆107Dec 17, 2016Updated 9 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- ☆32Jun 19, 2024Updated last year
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- ripPE - section extractor and profiler for PE file analysis☆33Aug 8, 2014Updated 11 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆111Sep 12, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆27Mar 1, 2022Updated 4 years ago
- ☆17Aug 4, 2014Updated 11 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Example plug-ins for GammaRay☆15Jun 4, 2018Updated 7 years ago
- This is a plugin for OllyDbg 1.10 to replace the old disasm engine by Capstone disassembly/disassembler framework.☆79Feb 4, 2015Updated 11 years ago
- Platform for Architecture-Neutral Dynamic Analysis☆2,727Feb 14, 2026Updated last month
- C++ application that uses memory and code hooks to detect packers☆276Mar 5, 2018Updated 8 years ago
- ☆105Apr 20, 2015Updated 10 years ago
- Random Code Store☆17Mar 27, 2023Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 13 years ago
- PHP obfuscator written in Javascript.☆14Oct 8, 2021Updated 4 years ago
- For BurpSuite Plugins☆10Jun 25, 2015Updated 10 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- ☆19Dec 19, 2019Updated 6 years ago
- Timeless debugging with symbolic execution and processor trace☆75Jan 23, 2021Updated 5 years ago
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 9 years ago