necst / automated-arancinoLinks
automated-arancino is a lightweight analysis framework to automate malware experiments.
☆15Updated 8 years ago
Alternatives and similar repositories for automated-arancino
Users that are interested in automated-arancino are comparing it to the libraries listed below
Sorting:
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆72Updated 3 years ago
- A system to record malware using PANDA☆44Updated 6 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 9 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago
- ☆58Updated 4 years ago
- ☆51Updated 6 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 5 years ago
- VMI-Unpack - A Virtual Machine Introspection (VMI) based generic unpacker.☆55Updated 5 years ago
- Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing compiler artifacts, binaries…☆28Updated 4 years ago
- ☆99Updated 11 months ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆28Updated 12 years ago
- ☆20Updated 5 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Updated 8 years ago
- Binary Ninja Posters☆35Updated 4 years ago
- Some glue facilitating remote use of IDA (the Interactive DisAssembler) Python API.☆77Updated 4 years ago
- IDA plugin for software complexity metrics assessment☆59Updated 7 years ago
- IDARay is an IDA Pro plugin that matches the database against multiple YARA files which themselves may contain multiple rules.☆18Updated 6 years ago
- ☆23Updated 6 years ago
- ☆15Updated 5 years ago
- suite of binaries used to test function identification☆29Updated 7 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Updated 5 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- Hansel - a simple but flexible search for IDA☆25Updated 5 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆41Updated 5 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆47Updated 8 years ago
- Backwards program slice stitching for automatic CTF problem solving.☆52Updated 6 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆34Updated 7 years ago
- ☆89Updated 6 years ago
- ☆49Updated 4 years ago
- ☆123Updated 4 years ago