Collection of Compressor and Crypter unpackers
☆107Feb 12, 2014Updated 12 years ago
Alternatives and similar repositories for Unpackers
Users that are interested in Unpackers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Sep 23, 2014Updated 11 years ago
- ☆13Sep 26, 2021Updated 4 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- xLCB plugin for x64dbg☆20Oct 4, 2016Updated 9 years ago
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago
- Various Crypter Project☆55Feb 26, 2014Updated 12 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Oct 27, 2011Updated 14 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- LD_PRELOAD rootkit utils☆16Jul 3, 2015Updated 10 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- MIR-Engine☆23Jul 6, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A simple example of dropping a PHP backdoor on a pfSense firewall over xmlrpc.php☆20Apr 16, 2015Updated 10 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- Binary Analysis Platform☆74Oct 21, 2013Updated 12 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- Replaced by https://github.com/Nukem9/SwissArmyKnife. A plugin for simple code signature generation in x64dbg☆43Jul 2, 2020Updated 5 years ago
- PE Infector/Cryptor source code☆20Jul 23, 2022Updated 3 years ago
- ☆17Oct 24, 2016Updated 9 years ago
- Automated malware unpacker☆121Mar 5, 2016Updated 10 years ago
- Rootkit☆24Nov 15, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆12Feb 19, 2017Updated 9 years ago
- IDA Patcher is a plugin for Hex-Ray's IDA Pro disassembler designed to enhance IDA's ability to patch binary files and memory.☆120Mar 12, 2016Updated 10 years ago
- Build a search engine from nmap XML files☆20Aug 19, 2014Updated 11 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/malware-lu☆57May 21, 2019Updated 6 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- Collection of scripts that were once useful for reverse engineering things☆75May 8, 2010Updated 15 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Open-Source Anti-RMT-Spam Firewall☆12Mar 28, 2016Updated 9 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub☆79Jul 2, 2012Updated 13 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Oct 9, 2015Updated 10 years ago
- Malware monitor template based on MinHook☆17Mar 29, 2015Updated 10 years ago
- ☆13Jun 20, 2013Updated 12 years ago
- This is a VmProtect integrated debugger, that will essentially allow you to disasm and debug vmp partially virtualized functions at the v…☆47Oct 18, 2016Updated 9 years ago