tianweiz07 / Cloud_Integrity
Using LibVMI to detect malware
☆31Updated 2 years ago
Alternatives and similar repositories for Cloud_Integrity:
Users that are interested in Cloud_Integrity are comparing it to the libraries listed below
- Security Evaluation of Dynamic Binary Instrumentation Engines☆79Updated 6 years ago
- VMI-Unpack - A Virtual Machine Introspection (VMI) based generic unpacker.☆55Updated 5 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆27Updated 10 years ago
- PoC for CVE-2017-0075☆37Updated 5 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Updated 7 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆31Updated 6 years ago
- ☆87Updated 9 years ago
- ☆27Updated last year
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- AFL fuzzing coverage CFG visualization☆31Updated 7 years ago
- KVM-based virtual machine introspection for malware analysis☆29Updated 7 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆22Updated 5 years ago
- PoC LibVMI-based GDB server for virtual machines☆53Updated 7 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- KLEE-TAINT - Klee with taint analysis support☆71Updated 7 years ago
- An Extensible Dynamic Analysis Framework for IoT Devices☆20Updated 6 years ago
- ☆47Updated 6 years ago
- Collection of tools for the Pin dynamic instrumentation framework☆42Updated 5 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆31Updated 6 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆25Updated last year
- run AFL with pintool☆65Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- Public release of the tools used to assist in gadget finding.☆41Updated 7 years ago
- A windbg extension, extracting token related contents☆41Updated 4 years ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆39Updated last year
- [SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature☆19Updated 6 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆41Updated 5 years ago
- Python based angr plug in for IDA Pro.☆34Updated 7 years ago