tianweiz07 / Cloud_IntegrityLinks
Using LibVMI to detect malware
☆31Updated 3 years ago
Alternatives and similar repositories for Cloud_Integrity
Users that are interested in Cloud_Integrity are comparing it to the libraries listed below
Sorting:
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- ☆87Updated 10 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆34Updated 7 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆31Updated 6 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Updated 5 years ago
- PoC for CVE-2017-0075☆37Updated 5 years ago
- ☆43Updated 8 years ago
- VMI-Unpack - A Virtual Machine Introspection (VMI) based generic unpacker.☆55Updated 5 years ago
- Collection of tools for the Pin dynamic instrumentation framework☆42Updated 5 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago
- ☆47Updated 6 years ago
- Tool to view heap chunks and memory writes (using pintool)☆39Updated 6 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆80Updated 6 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆30Updated 7 years ago
- A windbg extension, extracting token related contents☆41Updated 4 years ago
- AFL fuzzing coverage CFG visualization☆31Updated 7 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆26Updated last year
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆55Updated 8 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- PoC LibVMI-based GDB server for virtual machines☆53Updated 7 years ago
- A pytest module for The Interactive Disassembler and IDAPython; Record and Replay IDAPython API, execute inside IDA or use mockups of IDA…☆47Updated 6 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆27Updated 9 years ago
- ☆51Updated 6 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Updated 11 years ago
- FlowWalker is a practical off-line taint analysis framework with high efficiency and low overhead.☆10Updated 10 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆47Updated 8 years ago
- A stateful fuzzing engine.☆45Updated 6 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆42Updated 6 years ago