app.any.run malware submissions client
☆17Jan 2, 2020Updated 6 years ago
Alternatives and similar repositories for anyrun
Users that are interested in anyrun are comparing it to the libraries listed below
Sorting:
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆39Apr 25, 2013Updated 12 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Dec 27, 2022Updated 3 years ago
- Write-ups about challenges in https://pwnable.tw. Transferred from https://github.com/DoubleLabyrinth/pwnable.tw☆23Oct 31, 2018Updated 7 years ago
- Alteryx Developer Software Development Kit (SDK)☆14Apr 9, 2024Updated last year
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆14Jun 5, 2024Updated last year
- Linux kernel source tree☆10Oct 11, 2017Updated 8 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- Very simple VideoPlayer☆10Jan 3, 2023Updated 3 years ago
- Python wrapper around the Mac TIS functions to convert between chars and keycodes☆16Dec 1, 2015Updated 10 years ago
- A PDF that shows its own MD5☆11Jan 2, 2023Updated 3 years ago
- ☆12Apr 1, 2025Updated 11 months ago
- Integration fork of QEMU focusing on XNU platforms (arm, aarch64, etc)☆12Dec 12, 2022Updated 3 years ago
- a horse racing database for the Betfair Exchange☆11Jun 25, 2021Updated 4 years ago
- The ICS^2 Matrix is a threat taxonomy for Programmable Logic Controllers and Industrial Control Systems☆13Sep 10, 2024Updated last year
- A Roku streaming device controller for the browser using a Go server to host the static content and run a proxy to get around the restric…☆10May 5, 2020Updated 5 years ago
- Dev resources of Harmony☆15Mar 4, 2024Updated last year
- 支持加解密zip文件 Fork of Go's archive/zip to add reading/writing of password protected zip files.☆10Jul 9, 2024Updated last year
- Reliable UDP, Author Whg☆15Oct 8, 2019Updated 6 years ago
- Shadow Attack, LiRA, Quantile Regression and RMIA implementations in PyTorch (Online version)☆14Nov 8, 2024Updated last year
- Fuzzing Secure Monitor Implementations☆19Aug 3, 2024Updated last year
- Fork of QEMU with Virtual Machine Introspection patches☆14Sep 13, 2023Updated 2 years ago
- ☆10Dec 26, 2023Updated 2 years ago
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆13Mar 30, 2024Updated last year
- Proof-of-concept code for understanding the allow-jit entitlement on macOS☆30Feb 19, 2026Updated last week
- Centos6/7一键清理内核☆10Mar 10, 2020Updated 5 years ago
- Python Flask-RESTful template for cookiecutter☆11Mar 31, 2016Updated 9 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- A simple Mali 6xx/7xx register interface model that doesn't do any rendering.☆13Jan 29, 2016Updated 10 years ago
- KVM Virtual Machine Introspection Library☆48Dec 13, 2023Updated 2 years ago
- ☆13Jul 11, 2017Updated 8 years ago
- some classes which can help me to program kernel driver in Windows.☆16Feb 9, 2018Updated 8 years ago
- FFmpeg and DuiLib Plugin Demo☆10Jul 8, 2017Updated 8 years ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Apr 21, 2025Updated 10 months ago
- Material from ICS Village talk at DEFCON 25☆12Jul 30, 2018Updated 7 years ago
- ReasoningShield: Safety Detection over Reasoning Traces of Large Reasoning Models☆25Sep 27, 2025Updated 5 months ago
- A general way to Recover Safe linking protected value/pointer☆15Oct 23, 2022Updated 3 years ago
- 基于WinDivert实现的一个包过滤与截断程序☆13Jul 22, 2018Updated 7 years ago
- ☆11Aug 10, 2021Updated 4 years ago
- This is a ctf challenge for qemu escape, it's basic and normal, but there is a thinking trap in it, you may need some time to find out th…☆10Mar 28, 2024Updated last year