+
+

Related Products

  • TrustInSoft Analyzer
    6 Ratings
    Visit Website
  • Google Chrome Enterprise
    1,972 Ratings
    Visit Website
  • ActCAD Software
    401 Ratings
    Visit Website
  • DriveStrike
    23 Ratings
    Visit Website
  • Claude Code
    20 Ratings
    Visit Website
  • Rezku Point of Sale
    60 Ratings
    Visit Website
  • MedRight
    22 Ratings
    Visit Website
  • Highcharts
    122 Ratings
    Visit Website
  • Ninox
    542 Ratings
    Visit Website
  • Notifyre
    46 Ratings
    Visit Website

About

Immunity Debugger's interfaces include the GUI and a command line. The command line is always available at the bottom of the GUI. It allows the user to type shortcuts as if they were in a typical text-based debugger, such as WinDBG or GDB. Immunity has implemented aliases to ensure that your WinDBG users do not have to be retrained and will get the full productivity boost that comes from the best debugger interface on the market. Python commands can also be run directly from our command bar. Users can go back to previously entered commands, or just click in the dropdown menu and see all the recently used commands. Immunity Debugger's interfaces include the GUI and a command line. The command line is always available at the bottom of the GUI. It allows the user to type shortcuts as if they were in a typical text-based debugger, such as WinDBG or GDB.

About

Unlike in any other multiscanner, in PolySwarm there is money at stake: threat detection engines back their opinions with money, at the artifact level (file, URL, etc.), and are economically rewarded and penalized based on the accuracy of their determinations. The following process is automated and is executed by software (engines) in near real time. Users submit artifacts to PolySwarm’s network via API or web UI. Crowdsourced intelligence (engine determinations) and a final score (PolyScore) are sent back to the User. The money from the bounty and the assertions becomes the reward, which is securely escrowed in an Ethereum smart contract. Engines that made the right assertion are rewarded with the money from the initial bounty from the enterprise plus the money the losing engines included with their assertions.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT teams looking for a platform to write exploits, analyze malware, and reverse engineer binary files

Audience

Companies looking for a threat detection software

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$299 per month
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Immunity Debugger
Founded: 2002
United States
www.immunityinc.com/products/debugger/

Company Information

PolySwarm
Founded: 2017
United States
polyswarm.io

Alternatives

Alternatives

Palo Alto Networks WildFire

Palo Alto Networks WildFire

Palo Alto Networks
weinre

weinre

Apache Software Foundation
REVERSS

REVERSS

Anlyz

Categories

Categories

Integrations

Criminal IP ASM
Cyberstanc Scrutiny

Integrations

Criminal IP ASM
Cyberstanc Scrutiny
Claim Immunity Debugger and update features and information
Claim Immunity Debugger and update features and information
Claim PolySwarm and update features and information
Claim PolySwarm and update features and information