vmdiff / vmdiff-prototypeLinks
Diff and display virtual machine snapshots
☆245Updated 2 years ago
Alternatives and similar repositories for vmdiff-prototype
Users that are interested in vmdiff-prototype are comparing it to the libraries listed below
Sorting:
- Simple syscall sandboxing for Linux☆138Updated 3 weeks ago
- The xx file format. Turn your hex dumps into art, then into binary data.☆345Updated 2 years ago
- CLI tools: encoders/decoders, CTF and reverse engineering helpers.☆137Updated 3 weeks ago
- A multi-arch assembly REPL and emulator for your command line.☆308Updated 9 months ago
- ☆230Updated 2 years ago
- PageBuster - dump all executable pages of packed processes.☆203Updated 4 years ago
- Damn Vulnerable UEFI☆286Updated last year
- Hiding messages in x86 programs using semantic duals☆306Updated last week
- A stealthy ELF loader - no files, no execve, no RWX☆169Updated last year
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆64Updated 6 months ago
- Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of the …☆347Updated last week
- Rust Library Recognition Project for Rust Malware by the MSTIC-MIRAGE Team☆253Updated last month
- Python 2.7 bytecode d̶e̶o̶b̶f̶u̶s̶c̶a̶t̶o̶r unfucker☆202Updated last year
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- A minimal TLS 1.2 client implementation in a pure Bash script☆353Updated last year
- ☆425Updated 9 months ago
- ELEGANTBOUNCER is a detection tool for file-based mobile exploits.☆146Updated this week
- A library for intercepting system calls☆102Updated 8 months ago
- ☆89Updated 7 months ago
- A pure Python cleanroom implementation of libmagic, with instrumented parsing from Kaitai struct and an interactive hex viewer☆366Updated last week
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆193Updated last year
- A tool designed to make physical devices detectable by malware and make system look like virtual machine.☆394Updated 5 years ago
- Ariadne: Binary Ninja Graph Analysis Plugin☆96Updated 7 months ago
- XZ backdoor reverse engineering☆98Updated last year
- A list of public attacks on BitLocker☆320Updated last month
- A DTrace on Windows Reimplementation☆357Updated 7 months ago
- ☆27Updated 2 years ago
- Decompilation as a Service. Explore multiple decompilers and compare their output with minimal effort. Upload binary, get decompilation.☆457Updated 3 years ago
- A collection of Ghidra scripts, including the GPT-3 powered code analyser and annotator, G-3PO.☆310Updated 2 years ago
- Domain-specific infrastructure for analyzing, generating, and manipulating syntactically correct but semantically spec-non-compliant vide…☆316Updated 9 months ago