Skip to content

Penetration Testing

  • Home
  • Forensics
  • Malware Analysis
  • Network PenTest
    • Information Gathering
    • Vulnerability Analysis
    • Exploitation
      • Metasploit
    • Post Exploitation
    • Maintaining Access
    • Password Attacks
    • Sniffing & Spoofing
    • Smartphone PenTest
    • Wireless
  • Reverse Engineering
  • Programming
  • Technique
  • Web PenTest
    • Web Information Gathering
    • Web Vulnerability Analysis
    • Web Exploitation
    • Web Maintaining Access
    • Reporting
  • Big Data
  • Crypto
  • Ebooks
  • Defense
  • Linux
  • Machine Learning
  • Networking
  • Technique
  • Tips and Tricks

Penetration Testing

Security Training Share

  • Home
  • Forensics
  • Malware Analysis
  • Network PenTest
    • Information Gathering
    • Vulnerability Analysis
    • Exploitation
      • Metasploit
    • Post Exploitation
    • Maintaining Access
    • Password Attacks
    • Sniffing & Spoofing
    • Smartphone PenTest
    • Wireless
  • Reverse Engineering
  • Programming
  • Technique
  • Web PenTest
    • Web Information Gathering
    • Web Vulnerability Analysis
    • Web Exploitation
    • Web Maintaining Access
    • Reporting

Tagged: flare-emu

flare-emu

Malware Analysis / Reverse Engineering

September 2, 2019

 by do son · Published September 2, 2019

flare-emu: use and flexible interface for scripting emulation tasks

flare-emu flare-emu marries IDA Pro’s binary analysis capabilities with Unicorn’s emulation framework to provide the user with an easy to use and flexible interface for scripting emulation tasks. It is designed to handle all the housekeeping of...

Follow:

Search

RSS Suggested Reading

  • New serious vulnerabilities found in Android system
  • Researchers found privilege escalation and code execution vulnerabilities in Kaspersky software
  • New Android SMS service, RCS vulnerable to hacking




RSS BREAKING NEWS

  • Iranian hacker deploys new ZeroCleare data removal malware
  • U.S. data center vendor CyrusOne was infected by ransomware
  • Malicious Python library steal SSH and GPG keys

RSS TRENDING

  • China reuses “Great Cannon” tool to launches DDoS attacks on Hong Kong forum
  • Hackers stole unreleased music and tried to blame others
  • Sophos 2020 Threat Report: Ransomware attackers raise the stakes

RSS Linux news

  • ReactOS 0.4.13 RC30 releases: free Windows-compatible Operating System
  • Ubuntu releases new Intel microcode update to fix restart hangs
  • Manjaro 18.1.4-RC1 is available for testing, Professional and user-friendly Linux distro
  • Canonical introduces Ubuntu Pro with up to ten years of support for AWS
  • Univention Corporate Server 4.4-3 releases
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • DMCA NOTICE
  • Submit your articles

Penetration Testing © 2019. All Rights Reserved.

We use cookies to ensure that we give you the best experience on our website. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on Read more information.OkRead more