AllsafeCyberSecurity / Ghidra_Data_TypeLinks
for Windows Malware Analysis
☆14Updated 5 years ago
Alternatives and similar repositories for Ghidra_Data_Type
Users that are interested in Ghidra_Data_Type are comparing it to the libraries listed below
Sorting:
- ☆72Updated 2 years ago
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- Capa analysis importer for Ghidra.☆62Updated 4 years ago
- Ghidra plugin for https://analyze.intezer.com☆72Updated 2 years ago
- Function ID for Malware Analysis☆12Updated 5 years ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆71Updated last year
- ☆28Updated 5 years ago
- Parsers for custom malware formats ("Funky malware formats")☆97Updated 3 years ago
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆47Updated 9 months ago
- API Logger for Windows Executables☆79Updated 4 years ago
- Royal Road RTF Weaponizer object decoder☆24Updated last year
- RIXED LABS is open for contributions for it's community papers . If you want to publish a blog or a paper , it will be added to the site…☆80Updated 3 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆27Updated 3 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Updated 5 years ago
- TrashDBG the world's worse debugger☆23Updated 3 years ago
- An Integrity-Check Monitoring Pintool☆58Updated 4 years ago
- Utilities for working with vivisect☆25Updated 6 months ago
- Small visualizator for PE files☆70Updated 2 years ago
- Tools for inspecting YARA bytecode☆21Updated 5 years ago
- Set of antianalysis techniques found in malware☆131Updated 2 years ago
- FindCrypt for Ghidra written in Python☆26Updated 5 years ago
- Ixia ATI team open source or generally public material. Anything added here MUST be approved by Ixia Management.☆66Updated 6 years ago
- ☆23Updated 4 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- ☆74Updated last year
- Metadata hash incorporating the Rich Header for robustness against packing and other malware tricks☆68Updated 4 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 3 years ago
- Yet another rule generator for Yara☆29Updated 3 months ago
- ☆66Updated 6 years ago