nao-sec / starcLinks
Simple high-interactive client honeypot
☆24Updated 7 years ago
Alternatives and similar repositories for starc
Users that are interested in starc are comparing it to the libraries listed below
Sorting:
- This is a fuzzer for Windows SEH buffer overflow.☆15Updated 7 years ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆108Updated 2 years ago
- Malware Dynamic Analysis Platform enhanced Cuckoo Sandbox☆24Updated 7 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- 高対話型ハニーポット☆27Updated 6 years ago
- Linux rootkit experimentations☆19Updated 10 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Analyzing Rig Exploit Kit☆50Updated 8 years ago
- Analysis PE file or Shellcode☆49Updated 8 years ago
- Automated Memory Analysis (Black Hat Arsenal 2014)☆32Updated 10 years ago
- Tool for dropping malware from EK☆40Updated 7 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Updated 7 years ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆35Updated 5 years ago
- ☆32Updated 11 months ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Updated 7 years ago
- API functions for Malware Research☆35Updated 5 years ago
- ☆24Updated 6 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 9 years ago
- ☆14Updated 7 years ago
- QEMU with rVMI extensions☆25Updated 7 years ago
- Anti live forensic linux LKM rootkit☆17Updated 8 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Updated 8 years ago
- ☆28Updated 8 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- ASERT shared scripts for reversing☆32Updated 7 years ago
- Memory forensics of virtualization environments☆46Updated 10 years ago