A Tool to Unpack Self-Modifying Code using DynamoRIO
☆141Apr 17, 2017Updated 8 years ago
Alternatives and similar repositories for Selfie
Users that are interested in Selfie are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆382Apr 17, 2017Updated 8 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Dec 8, 2015Updated 10 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- C++ application that uses memory and code hooks to detect packers☆276Mar 5, 2018Updated 8 years ago
- ☆14May 9, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A tool to help malware analysts tell that the sample is injecting code into other process.☆79Aug 12, 2015Updated 10 years ago
- kernel exploitation helper class☆77Nov 26, 2016Updated 9 years ago
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago
- A pintool in order to unpack malware☆240Jul 30, 2016Updated 9 years ago
- windows kernel File redirection☆20Sep 21, 2014Updated 11 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Dec 9, 2015Updated 10 years ago
- Bit9 + Carbon Black Threat Intelligence☆81Mar 9, 2016Updated 10 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- capstone based disassembler for extracting to binnavi☆230Jun 8, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆52Sep 15, 2016Updated 9 years ago
- Open source library that implements translator and tools for REIL (Reverse Engineering Intermediate Language)☆512May 1, 2021Updated 4 years ago
- ☆16Jan 14, 2016Updated 10 years ago
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 10 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Aug 5, 2013Updated 12 years ago
- "Just Another ReVersIng Suite" or whatever other bullshit you can think of☆151Apr 28, 2023Updated 2 years ago
- ATrace is a tool for tracing execution of binaries on Windows.☆241Nov 19, 2025Updated 4 months ago
- ☆92Oct 28, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Intercept arbitrary functions at run-time, without knowing their typedefs☆88Apr 13, 2017Updated 8 years ago
- x64 Windows Software Fault Injection Tool☆17Dec 2, 2017Updated 8 years ago
- Augmenting Static Reverse Engineering with Dynamic Analysis and Instrumentation☆133Oct 10, 2014Updated 11 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- wow64 syscall filter☆14Nov 12, 2014Updated 11 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Mar 25, 2026Updated 2 weeks ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- An av windows engine with file guard and compress file enumator☆12Aug 25, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Collection of pin tools☆52Dec 29, 2015Updated 10 years ago
- IDAPython plugin for finding function strings recursively☆133May 17, 2022Updated 3 years ago
- Windows Software Exploitation☆136Feb 14, 2017Updated 9 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- ☆118Nov 11, 2012Updated 13 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Jun 19, 2020Updated 5 years ago
- ☆28Oct 30, 2016Updated 9 years ago