necst / crave
Framework to automatically test and explore the capabilities of generic AV engines
☆70Updated 6 years ago
Alternatives and similar repositories for crave:
Users that are interested in crave are comparing it to the libraries listed below
- A Python tool to generate ROP chains☆60Updated 6 years ago
- Binary Ninja Posters☆35Updated 4 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 7 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 6 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- QEMU with rVMI extensions☆25Updated 7 years ago
- ☆51Updated 6 years ago
- Memory forensics of virtualization environments☆46Updated 10 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 11 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Flare-On solutions☆36Updated 5 years ago
- ☆33Updated 9 years ago
- API functions for Malware Research☆35Updated 5 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 7 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 5 years ago
- Analysis PE file or Shellcode☆49Updated 8 years ago
- BinCrowd Plugin for IDA Pro☆41Updated 13 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 5 years ago
- ☆23Updated 5 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 5 years ago
- A fuzz job for ClamAV☆31Updated 8 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 6 years ago
- ☆39Updated 3 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆50Updated 6 years ago
- ☆91Updated 5 years ago
- Collection of pin tools☆51Updated 9 years ago
- Simple reporting plugin for binary ninja☆16Updated 6 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- ☆22Updated 7 years ago