DissectMalware / yaradbg-backendLinks
☆25Updated last year
Alternatives and similar repositories for yaradbg-backend
Users that are interested in yaradbg-backend are comparing it to the libraries listed below
Sorting:
- ☆39Updated last year
- ☆33Updated 11 months ago
- Identifies metadata of .NET binary files.☆21Updated last year
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆56Updated 9 months ago
- ☆29Updated last month
- Help deobfuscate VBScript☆16Updated 3 years ago
- ☆18Updated 9 months ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Updated last month
- Progress of learning kernel development☆14Updated 2 years ago
- rpv-web is a browser based frontend for the rpv library☆25Updated 5 months ago
- Golang bindings for PE-sieve☆42Updated last year
- ☆37Updated 7 months ago
- General malware analysis stuff☆37Updated last year
- the Open Source and Pure C++ Packer for eXecutables☆21Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Updated last year
- ☆24Updated 11 months ago
- A feed of malware samples curated from threat intelligence sources.☆28Updated 2 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- Neutralize KEPServerEX anti-debugging techniques☆32Updated 2 years ago
- ☆26Updated 2 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- ☆32Updated 7 months ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆36Updated 2 years ago
- Small visualizator for PE files☆70Updated 2 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆28Updated 3 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆64Updated 2 years ago
- Implementation of ITaskHandler in C++☆13Updated 2 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆27Updated 3 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆35Updated 3 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆45Updated 2 years ago