All Projects → adrianherrera → malware-s2e

adrianherrera / malware-s2e

Licence: other
Code for my blog post on using S2E for malware analysis

Programming Languages

C++
36643 projects - #6 most used programming language
c
50402 projects - #5 most used programming language

Projects that are alternatives of or similar to malware-s2e

CRAX
CRAX: software CRash analysis for Automatic eXploit generation
Stars: ✭ 44 (+109.52%)
Mutual labels:  symbolic-execution, s2e
AutoIt-Ripper
Extract AutoIt scripts embedded in PE binaries
Stars: ✭ 101 (+380.95%)
Mutual labels:  malware
Whitecomet-Research
Research on malware creation and protection
Stars: ✭ 62 (+195.24%)
Mutual labels:  malware
RoboThief-Telegram-Session-Stealer
Robo Thief is a software for steal telegram session .
Stars: ✭ 18 (-14.29%)
Mutual labels:  malware
Windows-APT-Warfare
著作《Windows APT Warfare:惡意程式前線戰術指南》各章節技術實作之原始碼內容
Stars: ✭ 241 (+1047.62%)
Mutual labels:  malware
MSE
Malware sample exchange system and API intended for Anti-Virus companies and researchers.
Stars: ✭ 14 (-33.33%)
Mutual labels:  malware
Rel
Binsec/Rel is an extension of Binsec that implements relational symbolic execution for constant-time verification and secret-erasure at binary-level.
Stars: ✭ 27 (+28.57%)
Mutual labels:  symbolic-execution
MalwareDatabase
Malware samples for analysis, researchers, anti-virus and system protection testing.(1300+ Malware-samples!)
Stars: ✭ 21 (+0%)
Mutual labels:  malware
Malware-with-Backdoor-and-Keylogger
👨🏻‍💻 A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.
Stars: ✭ 25 (+19.05%)
Mutual labels:  malware
fake-sandbox
👁‍🗨 This script will simulate fake processes of analysis sandbox/VM software that some malware will try to avoid.
Stars: ✭ 110 (+423.81%)
Mutual labels:  malware
ph-malhide
Process Hacker 2 hiding from external applications
Stars: ✭ 17 (-19.05%)
Mutual labels:  malware
kleespectre
KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling
Stars: ✭ 31 (+47.62%)
Mutual labels:  symbolic-execution
MalScan
A Simple PE File Heuristics Scanners
Stars: ✭ 41 (+95.24%)
Mutual labels:  malware
apooxml
Generate YARA rules for OOXML documents.
Stars: ✭ 34 (+61.9%)
Mutual labels:  malware
crusher
No description or website provided.
Stars: ✭ 21 (+0%)
Mutual labels:  symbolic-execution
Automated-Malware-Analysis-List
My personal Automated Malware Analysis Sandboxes and Services
Stars: ✭ 20 (-4.76%)
Mutual labels:  malware
Vital
Malware for Discord, designed to steal passwords, tokens, and inject discord folders for long-term use.
Stars: ✭ 50 (+138.1%)
Mutual labels:  malware
mitre-visualizer
🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)
Stars: ✭ 49 (+133.33%)
Mutual labels:  malware
VBoxCloak
A PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to evade analysis. Guaranteed to bring down your pafish ratings by at least a few points ;)
Stars: ✭ 49 (+133.33%)
Mutual labels:  malware
MalwareHashDB
Malware hashes for open source projects.
Stars: ✭ 31 (+47.62%)
Mutual labels:  malware

Analysing "Trigger-based" Malware with S2E

This code accompanies my Analysing "Trigger-based" Malware blog post and slides.

Both directories should be copied into the windows directory of the guest-tools repo in your S2E environment, located at $S2EDIR/source/s2e/guest/windows.

Open the s2e.sln solution in Visual Studio and add the malware-inject, GetLocalTime-hook and wannacry-hook projects to the s2e solution.

The GetLocalTime-test project can be used to test symbolic execution of GetLocalTime. GetLocalTime-test is a stand-alone project and does not have to be added to the s2e solution.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].