Blueliv / maze-deobfuscation
☆12Updated 5 years ago
Alternatives and similar repositories for maze-deobfuscation:
Users that are interested in maze-deobfuscation are comparing it to the libraries listed below
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 5 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 5 years ago
- Analysis of VBS exploit CVE-2018-8174☆31Updated 6 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆41Updated 5 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆31Updated 6 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆55Updated 8 years ago
- ☆34Updated 3 years ago
- Public repository for HEVD exploits☆20Updated 6 years ago
- ☆28Updated 4 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Updated 6 years ago
- Allows IDA PRO to disassemble x86-64 code (WOW64) in 32-bit database☆25Updated 3 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆29Updated 8 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆90Updated 5 years ago
- A little WinDbg extension to help dump the state of Win32k Type Isolation structures.☆38Updated 7 years ago
- IDA script for vmprotect Windows Api address decoder☆51Updated 3 years ago
- My conference presentations and publications☆26Updated 3 years ago
- Windows Injection 101: from Zero to ROP (HITCON 2017)☆28Updated 7 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- Automated library compilation and PDB annotation with CMake and IDA Pro☆21Updated 6 years ago
- Use WinDBG to trace the Windows API calls of any Portable Executable file☆31Updated 8 years ago
- IDARay is an IDA Pro plugin that matches the database against multiple YARA files which themselves may contain multiple rules.☆18Updated 6 years ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆73Updated 5 years ago
- IDA Pro resources, scripts, and configurations☆111Updated last year
- The place where my HackSys Extreme Vulnerable Driver exploits go.☆25Updated 6 years ago
- ☆39Updated 4 years ago
- PoC for CVE-2017-0075☆37Updated 5 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- ☆33Updated 2 years ago