BinaryDefense / GhidraRustDependenciesExtractorLinks
Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary
☆29Updated 3 years ago
Alternatives and similar repositories for GhidraRustDependenciesExtractor
Users that are interested in GhidraRustDependenciesExtractor are comparing it to the libraries listed below
Sorting:
- Keep it secret, keep it safe☆78Updated 6 months ago
- Batch script to compile a binary shellcode blob into an exe file☆88Updated 6 years ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆55Updated 4 months ago
- Configuration Extractor for BlackCat Ransomware☆30Updated 3 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Updated 2 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆121Updated 3 years ago
- General malware analysis stuff☆37Updated last year
- ☆55Updated 3 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆105Updated 2 months ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆54Updated 8 months ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆55Updated 3 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 3 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆34Updated last year
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 5 years ago
- Golang bindings for PE-sieve☆42Updated last year
- Powershell Linter☆80Updated last month
- DNS over HTTPS targeted malware (only runs once)☆97Updated 2 years ago
- OFFZONE 2024 Malware Persistence workshop☆19Updated 8 months ago
- A golang CLI tool to download malware from a variety of sources.☆150Updated last month
- ☆45Updated 4 years ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆63Updated 2 years ago
- ☆33Updated 2 years ago
- A feed of malware samples curated from threat intelligence sources.☆28Updated last year
- Remote Command executor☆77Updated 2 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆131Updated last year
- ☆68Updated 2 years ago