necst / automated-arancino
automated-arancino is a lightweight analysis framework to automate malware experiments.
☆15Updated 8 years ago
Alternatives and similar repositories for automated-arancino:
Users that are interested in automated-arancino are comparing it to the libraries listed below
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆72Updated 3 years ago
- A system to record malware using PANDA☆43Updated 5 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 6 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 8 years ago
- ☆58Updated 4 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 5 years ago
- ☆49Updated 4 years ago
- ☆51Updated 6 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 5 years ago
- VMI-Unpack - A Virtual Machine Introspection (VMI) based generic unpacker.☆55Updated 5 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆86Updated 7 years ago
- SAFE embeddings to match functions in yara☆100Updated 5 years ago
- suite of binaries used to test function identification☆28Updated 7 years ago
- Yet Another YARA rule Generator☆63Updated 6 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆34Updated 7 years ago
- Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing compiler artifacts, binaries…☆28Updated 4 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆28Updated 12 years ago
- ☆99Updated 10 months ago
- IDARay is an IDA Pro plugin that matches the database against multiple YARA files which themselves may contain multiple rules.☆18Updated 6 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- Some glue facilitating remote use of IDA (the Interactive DisAssembler) Python API.☆77Updated 4 years ago
- IDA plugin for software complexity metrics assessment☆59Updated 7 years ago
- Automated library compilation and PDB annotation with CMake and IDA Pro☆21Updated 6 years ago
- ☆100Updated 10 months ago
- Automatically exported from code.google.com/p/mynav☆29Updated 10 years ago
- grap: define and match graph patterns within binaries☆171Updated 4 years ago
- ☆23Updated 5 years ago
- Utilities for generating dynamic traces☆92Updated last month
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆41Updated 5 years ago
- ☆15Updated 5 years ago