CIRCL / PyRichHeaderLinks
A Python parser for Rich Headers
☆15Updated 10 years ago
Alternatives and similar repositories for PyRichHeader
Users that are interested in PyRichHeader are comparing it to the libraries listed below
Sorting:
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆18Updated 9 years ago
- analysis of visual basic code☆45Updated 7 years ago
- Malware analyses and helpful scripts☆29Updated 3 years ago
- MALM: Malware Monitor☆49Updated 12 years ago
- Sample libraries to be used with IAT Patcher☆36Updated 3 years ago
- ☆32Updated last year
- Anti-AV compilation☆44Updated 12 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Updated 8 years ago
- Analysis PE file or Shellcode☆50Updated 9 years ago
- ☆27Updated 3 years ago
- Scanner for Regin Virtual Filesystems☆26Updated 10 years ago
- CAPE monitor DLLs☆41Updated 5 years ago
- C++ wrapper for YARA.☆45Updated 5 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 8 years ago
- Set of python scripts to analyse PE32/PE64 binaries and to extract VB 5/6 headers and Visual Basic p-code functions.☆48Updated 10 years ago
- ☆23Updated 4 years ago
- Bootkits Revisited☆40Updated 11 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆29Updated 11 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆56Updated 8 years ago
- Malware.lu configuration extractor☆25Updated 11 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Updated 9 years ago
- Yet another Python library to read and write PE/PE+ files.☆78Updated 9 years ago
- a collection of yara rules for binary analysis☆24Updated 8 years ago
- ViDi Visual Disassembler (experimental)☆78Updated last month
- Transfer EIP control to shellcode during malware analysis investigation☆78Updated 11 years ago
- ransomware_begone☆42Updated 9 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 11 years ago
- Application for random attack on Green Petya's key☆25Updated 8 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago