user1342 / Awesome-Binary-Analysis-AutomationLinks
A curated list of awesome binary analysis automation training, resources, and tools.
☆44Updated last year
Alternatives and similar repositories for Awesome-Binary-Analysis-Automation
Users that are interested in Awesome-Binary-Analysis-Automation are comparing it to the libraries listed below
Sorting:
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆38Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated last month
- External Playbooks for Public Access☆39Updated 7 months ago
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.☆63Updated 10 months ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆64Updated 9 months ago
- ☆24Updated 2 years ago
- Real Android malware apps discussed in the book☆38Updated last year
- 💎 Vulnerability assessment and vulnerability intelligence tool searching for vulnerabilities and exploits using keywords across multiple…☆36Updated 7 months ago
- ☆63Updated 2 years ago
- information about ransomware groups (Ransomware Analysis Notes)☆39Updated last year
- Collection of my Security Blueprints & Guides☆51Updated last month
- Detect code obfuscation through text classification in the detection process.☆45Updated last year
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆89Updated 5 months ago
- ☆25Updated 3 weeks ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆54Updated 8 months ago
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation☆46Updated 3 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆49Updated last year
- Bluetooth Security Assessment Methodology☆133Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- Malware Analysis tools☆26Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆72Updated 9 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- ☆116Updated 2 years ago
- Manage (and soon deploy) Android machines with pre-defined behaviors for Cyber Range environments.☆86Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 3 years ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆126Updated last month
- damn-exploitable-android-app-apk☆40Updated 2 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 4 months ago
- hiding in plain sight: part 2☆45Updated last year