ElvisBlue / emotet-deobfuscator
IDA plugin to deobfuscate emotet CFF
☆17Updated 3 years ago
Alternatives and similar repositories for emotet-deobfuscator:
Users that are interested in emotet-deobfuscator are comparing it to the libraries listed below
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- Currently proof-of-concept☆16Updated 3 years ago
- IDA Python deobfuscation script for ConfuserEx binaries☆35Updated 2 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆64Updated last year
- A driver to implement IOCTL hooking☆24Updated 3 years ago
- A debugger backend for IDA Pro built on top of of Intel’s PIN framework☆31Updated last year
- Simple x64dbg plugin to save a full memory dump☆50Updated 2 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆19Updated 3 years ago
- Các IDA Flirt signatures HTC tạo☆19Updated 6 months ago
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆37Updated last year
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆24Updated last year
- Simplifier vmp ultra☆17Updated last year
- Helper script for Windows kernel debugging with IDA Pro on native Bochs debugger (including PDB symbols)☆62Updated last year
- Code Integrity Violation Spotter☆16Updated 10 months ago
- ☆18Updated 2 months ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Updated 2 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Updated last year
- ☆31Updated 3 years ago
- clone of armadillo patched for windows☆47Updated 6 months ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆60Updated 8 months ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆38Updated 3 years ago
- ☆17Updated 3 years ago
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆34Updated 3 years ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆16Updated 3 years ago
- ☆19Updated 8 years ago
- Portable & Custmizable Windows Defender☆12Updated 3 years ago
- ☆29Updated 3 years ago
- UnpacMe IDA Byte Search☆28Updated last year
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆26Updated 3 years ago