Similarity Analysis to Defeat Malware Compiler Variations
☆25Oct 3, 2017Updated 8 years ago
Alternatives and similar repositories for Cardinal
Users that are interested in Cardinal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Jan 12, 2018Updated 8 years ago
- ☆12Jun 14, 2017Updated 8 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- Analysis PE file or Shellcode☆50Jul 28, 2016Updated 9 years ago
- Modified from pwndbg. Enhance the UI part for better usage.☆26Jun 14, 2019Updated 6 years ago
- Cheat Sheets of the tools/programming languages☆12Jul 8, 2018Updated 7 years ago
- Kernel debugger using Timeless Debugging method.☆74Feb 16, 2017Updated 9 years ago
- PyAna - Analyzing the Windows shellcode☆247Feb 16, 2016Updated 10 years ago
- Lightweight Symbolic Execution Engine☆23Jul 1, 2015Updated 10 years ago
- Basic x86 Symbolic Execution for educational purposes☆18May 8, 2017Updated 8 years ago
- Tools for inspecting disk images☆24Nov 23, 2018Updated 7 years ago
- Instruction cache leakage detection tool for modular exponentation software.☆15Mar 17, 2017Updated 9 years ago
- Unofficial mirror of☆11Feb 2, 2018Updated 8 years ago
- [Not work] Deobfuscate obfuscated binaries!☆11Dec 16, 2016Updated 9 years ago
- Automated Memory Analysis (Black Hat Arsenal 2014)☆32Aug 4, 2014Updated 11 years ago
- A blanket execution/min hash semantic hash tool for binary function identification☆18Apr 22, 2016Updated 9 years ago
- ELF/PE/Mach-O parsing library☆52Mar 19, 2024Updated 2 years ago
- DEPRECATED avatar-panda repository; please use https://github.com/panda-re/panda☆13Mar 19, 2021Updated 5 years ago
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Jan 29, 2019Updated 7 years ago
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 3 months ago
- Z3 Symbolic Execution python☆28Dec 28, 2017Updated 8 years ago
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- A study on the automation of unpacking API wrapping in Themida☆12May 3, 2018Updated 7 years ago
- A small library that help CTFer quickly write payload☆24Jun 19, 2019Updated 6 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- Experiemental userspace eBPF library☆15Aug 10, 2015Updated 10 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Sep 28, 2018Updated 7 years ago
- Decompile an x86 exe, and read PE infos.☆19Sep 29, 2018Updated 7 years ago
- A simple VM to play with OSR in LLVM☆15Jun 11, 2017Updated 8 years ago
- Simple tool to regularly pool Tor HSDirs for hidden service descriptors☆10Jul 3, 2015Updated 10 years ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Feb 25, 2017Updated 9 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Dec 18, 2016Updated 9 years ago
- elisp bindings for the capstone disassembler☆23May 13, 2020Updated 5 years ago
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 5 years ago
- Dynamic instrumentation of the Linux kernel☆41Feb 24, 2015Updated 11 years ago
- SEViz (Symbolic Execution VisualIZer) is a tool for visualizing symbolic execution-based test generation☆20Nov 24, 2015Updated 10 years ago
- libs2e.so☆19Dec 19, 2020Updated 5 years ago