KVM-based virtual machine introspection for malware analysis
☆29May 11, 2017Updated 8 years ago
Alternatives and similar repositories for nitro
Users that are interested in nitro are comparing it to the libraries listed below
Sorting:
- VMI-Unpack - A Virtual Machine Introspection (VMI) based generic unpacker.☆57Jan 16, 2020Updated 6 years ago
- Fork of QEMU with Virtual Machine Introspection patches☆14Sep 13, 2023Updated 2 years ago
- A blanket execution/min hash semantic hash tool for binary function identification☆18Apr 22, 2016Updated 9 years ago
- Test suite for bypassing Malware sandboxes.☆38Oct 20, 2014Updated 11 years ago
- Fork of KVM with Virtual Machine Introspection patches☆37Jan 22, 2026Updated last month
- my .vimrc in ubuntu☆14May 2, 2016Updated 9 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- ☆62May 30, 2023Updated 2 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- Sandbox d'analyse de malware pour Windows 7 avec un client TCP en mode noyau☆19Feb 23, 2016Updated 10 years ago
- Linux malware analysis based on Cuckoo Sandbox.☆41Apr 19, 2023Updated 2 years ago
- ☆47Aug 20, 2018Updated 7 years ago
- PoC LibVMI-based GDB server for virtual machines☆54Dec 13, 2017Updated 8 years ago
- VMI on BitVisor to detect hidden rootkits.☆27Dec 19, 2016Updated 9 years ago
- onigiri - remote malware triage script☆24Nov 5, 2015Updated 10 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Jul 12, 2016Updated 9 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Using LibVMI to detect malware☆32Apr 3, 2022Updated 3 years ago
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆40Dec 14, 2022Updated 3 years ago
- A Rust driver for the Arm Generic Interrupt Controller version 3 or 4 (GICv3 and GICv4).☆38Aug 18, 2025Updated 6 months ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- ☆12Feb 3, 2026Updated 3 weeks ago
- Linux kernel source tree☆10Oct 11, 2017Updated 8 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Past presentation materials☆10Jul 10, 2018Updated 7 years ago
- A Multithread PcapNG capturing tool with Hardware timestamping☆10Nov 6, 2016Updated 9 years ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆14Jun 5, 2024Updated last year
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 14 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43May 18, 2017Updated 8 years ago
- Malware Behavior Analyzer☆158Jun 1, 2017Updated 8 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- EECS4080 Project at York University. A distribute proxy system to circumvent content filtering firewall. Data units are randomly distribu…☆13Oct 23, 2019Updated 6 years ago
- 解析PE文件,对PE文件进行静态变形,简单的加密壳。☆10Dec 26, 2020Updated 5 years ago
- Crossplatform hex editor intended mainly for reverse-engineering and data analysis☆10Mar 10, 2018Updated 7 years ago
- event shipper for Carbon Black Defense notifications☆10Feb 25, 2023Updated 3 years ago
- A library for python-based application logging and data collection☆19Aug 29, 2018Updated 7 years ago
- Repository for team's work on the Microsoft Malware Classification Challenge Kaggle competition.☆11Mar 17, 2015Updated 10 years ago
- The repository contains public sources of the CPDev (Control Program Developer) virtual machine runtime (VM). The environment is availabl…☆18Nov 21, 2025Updated 3 months ago