yotsubo / o-checkerLinks
☆11Updated 7 years ago
Alternatives and similar repositories for o-checker
Users that are interested in o-checker are comparing it to the libraries listed below
Sorting:
- Detect x86 shellcode in files and traffic.☆25Updated 7 years ago
- Parallel ssdeep clustering kit☆20Updated 7 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- My conference presentations and publications☆26Updated 3 years ago
- ☆52Updated 6 years ago
- PDF Malware Parser☆20Updated 9 years ago
- Emu-strings project - JScript/VBScript automated dropper analysis system☆18Updated 4 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆31Updated 6 years ago
- ☆14Updated 6 years ago
- Regular expression Search on the command-line☆16Updated 3 months ago
- Utilities for working with vivisect☆25Updated 4 months ago
- reven2-scripts contains a set of REVEN scripts to automate timeless-analysis on REVEN traces.☆30Updated 2 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- Presented hardware reverse engineering workshops since 2019☆61Updated 11 months ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 6 years ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆15Updated 7 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 6 years ago
- PoC for the taint-based ROP approach☆14Updated 2 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- A python script that can be used to scan data within in an IDB using Yara.☆23Updated 6 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Updated 5 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 4 years ago
- ☆32Updated last year
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago