DissectMalware / yaradbg-backendLinks
☆25Updated last year
Alternatives and similar repositories for yaradbg-backend
Users that are interested in yaradbg-backend are comparing it to the libraries listed below
Sorting:
- ☆39Updated last year
- Identifies metadata of .NET binary files.☆21Updated last year
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆54Updated 7 months ago
- A feed of malware samples curated from threat intelligence sources.☆28Updated last year
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated last year
- rpv-web is a browser based frontend for the rpv library☆26Updated 3 months ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆56Updated 3 weeks ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- ☆37Updated 5 months ago
- ☆30Updated 9 months ago
- ☆18Updated 7 months ago
- A pcap capture analysis helper☆25Updated last year
- Golang bindings for PE-sieve☆42Updated last year
- Help deobfuscate VBScript☆16Updated 3 years ago
- ☆28Updated 9 months ago
- Slides from various conference talks☆37Updated 2 years ago
- the Open Source and Pure C++ Packer for eXecutables☆21Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆22Updated 10 months ago
- A utility that can be used to launch an executable with a DLL injected☆20Updated last year
- ☆31Updated 5 months ago
- General malware analysis stuff☆37Updated last year
- Progress of learning kernel development☆14Updated 2 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- ☆27Updated 9 months ago
- Repo containing my public talks☆23Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- ☆12Updated 3 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆27Updated 4 months ago
- ☆74Updated last year
- Finds imports that could be exploited, still requires manual analysis.☆28Updated 2 years ago