Framework to automatically test and explore the capabilities of generic AV engines
☆70Jan 15, 2019Updated 7 years ago
Alternatives and similar repositories for crave
Users that are interested in crave are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago
- An open source virus scan aggregation framework.☆25Apr 25, 2014Updated 11 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆16Apr 17, 2017Updated 8 years ago
- A loadable dll that tracks memory changes, IAT hooks, and dynamically emplaced "JMP" in the x86 host executable.☆12Oct 22, 2023Updated 2 years ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆17Dec 20, 2018Updated 7 years ago
- ☆23May 19, 2019Updated 6 years ago
- Black Hat 2017 Talk☆12Jul 31, 2017Updated 8 years ago
- Emu-strings project - JScript/VBScript automated dropper analysis system☆18Mar 25, 2021Updated 4 years ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆73Apr 28, 2022Updated 3 years ago
- ☆11Aug 28, 2024Updated last year
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆69Sep 5, 2017Updated 8 years ago
- A (Miasm2 + binaryninja) based function divination.☆15Oct 22, 2017Updated 8 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- Collaborative malware analysis framework☆382Jan 22, 2019Updated 7 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated 3 weeks ago
- Automatically generate AV byte signatures from sets of similar binaries.☆288Dec 10, 2024Updated last year
- Polymorphic VM and PoliCTF '17 reversing challenge.☆73Sep 20, 2024Updated last year
- FakeOpenSmtpRelay.py is a Python3 script simulating a working open SMTP relay☆13Mar 18, 2019Updated 7 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- This project aims at simplifying Windows API import recovery on arbitrary memory dumps☆263Mar 27, 2023Updated 2 years ago
- Yara rules for quick reverse engineering of malware.☆19Dec 9, 2015Updated 10 years ago
- DEPRECATED avatar-panda repository; please use https://github.com/panda-re/panda☆13Mar 19, 2021Updated 5 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- crash poc & Leak info PoC☆18Mar 19, 2018Updated 8 years ago
- suite of binaries used to test function identification☆28Nov 7, 2017Updated 8 years ago
- bitshred research project code.☆14Feb 12, 2016Updated 10 years ago
- ☆179Nov 25, 2018Updated 7 years ago
- ☆16May 6, 2015Updated 10 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆18Oct 7, 2016Updated 9 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆81Sep 1, 2018Updated 7 years ago
- A stateful fuzzing engine.☆45Nov 14, 2018Updated 7 years ago
- Symbolic Simplification with PAttern Matching☆108Feb 22, 2017Updated 9 years ago
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 9 years ago
- ☆91Oct 28, 2016Updated 9 years ago
- The Binary Mutation code based on Uroboros☆14Feb 20, 2019Updated 7 years ago
- Transfer analysis data between Binary Ninja and IDA☆139Oct 16, 2025Updated 5 months ago