sporksmith / polygraphLinks
☆14Updated 10 years ago
Alternatives and similar repositories for polygraph
Users that are interested in polygraph are comparing it to the libraries listed below
Sorting:
- A system to record malware using PANDA☆45Updated 6 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆111Updated 3 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆86Updated 8 years ago
- Investigation Planner for fast running analysis with predictable execution time. For example, static analysis.☆27Updated 6 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 8 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Updated 10 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 9 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆150Updated 3 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆76Updated 10 years ago
- Automated Memory Analysis (Black Hat Arsenal 2014)☆32Updated 11 years ago
- A little tool to execute functions without debugging an entire executable. Originally written by Gonzalo J. Carracedo (BatchDrake).☆29Updated 11 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆33Updated 9 years ago
- Similarity Analysis to Defeat Malware Compiler Variations☆25Updated 8 years ago
- ☆93Updated 7 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Updated 9 years ago
- ☆12Updated 8 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Updated 8 years ago
- ☆36Updated 12 years ago
- A tool to predict vulnerability discovery of binary only programs☆187Updated 8 years ago
- ☆50Updated 13 years ago
- Proof-of-concept automated baremetal malware analysis framework.☆14Updated 10 years ago
- Dynamic security analysis of embedded systems’ firmwares☆83Updated 9 years ago
- statistical similarity of binaries (Esh)☆73Updated 9 years ago
- Memory forensics of virtualization environments☆48Updated 11 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 9 years ago
- A search tool for IDA☆70Updated 9 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆15Updated 8 years ago
- A Libemu Cython wrapper☆128Updated 2 years ago
- Using Machine Learning to predict the outcome of a zzuf fuzzing campaign☆23Updated 10 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Updated 13 years ago