trailofbits / flying-sandbox-monster
Sandboxed, Rust-based, Windows Defender Client
☆177Updated 7 years ago
Alternatives and similar repositories for flying-sandbox-monster:
Users that are interested in flying-sandbox-monster are comparing it to the libraries listed below
- AppJailLauncher in Rust☆109Updated 3 years ago
- ☆173Updated 2 years ago
- Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins☆134Updated 6 years ago
- Conference slides and White-papers☆356Updated 5 years ago
- Simpleator ("Simple-ator") is an innovative Windows-centric x64 user-mode application emulator that leverages several new features that w…☆350Updated 6 years ago
- rVMI - A New Paradigm For Full System Analysis☆352Updated 7 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆184Updated 2 years ago
- capstone based disassembler for extracting to binnavi☆226Updated 8 years ago
- NASM Standard Library for shellcode☆69Updated 8 years ago
- C++ application that uses memory and code hooks to detect packers☆270Updated 6 years ago
- Full-bin indexation of binary files☆95Updated 6 years ago
- Hypervisor-based debugger☆185Updated 4 years ago
- Binary Ninja plugin to decompile binaries using RetDec API☆162Updated 6 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆284Updated 8 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)☆185Updated 5 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆124Updated 7 years ago
- ☆85Updated 7 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆156Updated 8 years ago
- Reverse engineering tool for automatic structure recovering and memory use analysis based on DynamoRIO and Capstone☆318Updated 5 years ago
- LibVMI-based debug server, implemented in Python. Building a guest aware, stealth and agentless full-system debugger☆216Updated 4 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 8 years ago
- grap: define and match graph patterns within binaries☆170Updated 3 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆243Updated 5 years ago
- Implementation of the SMM rootkit "The Watcher"☆124Updated 2 years ago
- Loading unsigned code into kernel in Windows 10 (64) with help of VMware Workstation Pro/Player design flaw☆138Updated 7 years ago
- ATrace is a tool for tracing execution of binaries on Windows.☆236Updated 8 years ago
- Interactive Disassembler GUI - This Repository is NOT a supported MongoDB product☆247Updated 8 years ago
- Binary coverage tool without binary modification for Windows☆430Updated 4 years ago
- Semantic Binary Code Analysis Framework☆125Updated 9 years ago
- A hypervisor for fuzzing built with WHVP and Bochs☆370Updated 5 years ago