packing-box / dataset-packed-elf
Dataset of packed ELF samples
☆19Updated 2 years ago
Alternatives and similar repositories for dataset-packed-elf:
Users that are interested in dataset-packed-elf are comparing it to the libraries listed below
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆47Updated 4 months ago
- Code snippets for Qiling Tutorials☆20Updated 4 years ago
- Rekall Memory Forensic Framework☆32Updated 5 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- ☆15Updated last year
- ☆28Updated 2 years ago
- My collection of unpackers for malware packers/crypters☆28Updated 7 years ago
- Utilities for working with vivisect☆25Updated last month
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Updated 2 years ago
- ☆28Updated 4 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆28Updated last year
- ☆24Updated 5 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- This repository contains D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation.☆35Updated 4 years ago
- A small tool to unmap PE memory dumps.☆11Updated last year
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- Dataset of packed PE samples☆34Updated 9 months ago
- My malware analysis code snippets☆27Updated last year
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 3 years ago
- ☆25Updated 5 months ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆26Updated 3 years ago
- A set of small utilities, helpers for PIN tracers☆33Updated last year
- Repository of vulnerabilities disclosed by ESET☆28Updated 2 years ago
- Slides from various conference talks☆36Updated last year
- Super IOCTL Basic Fuzzer☆15Updated 5 years ago
- Flare-On solutions☆36Updated 5 years ago
- Analysis of VBS exploit CVE-2018-8174☆31Updated 6 years ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆31Updated 5 years ago
- A collection of empty MSVC projects, compiled using various versions and configurations of Visual Studio.☆32Updated 10 months ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆60Updated 8 months ago