GDATASoftwareAG / TypeRefHasherLinks
CLI tool to compute the TypeRefHash for .NET binaries.
☆19Updated 4 years ago
Alternatives and similar repositories for TypeRefHasher
Users that are interested in TypeRefHasher are comparing it to the libraries listed below
Sorting:
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆32Updated 5 years ago
- Collection of my own detection rules☆20Updated 5 months ago
- ☆33Updated 3 years ago
- Help deobfuscate VBScript☆17Updated 3 years ago
- Generates YARA rules to detect malware using API hashing☆17Updated 4 years ago
- A powershell parser for https://github.com/ufrisk/MemProcFS☆44Updated 4 years ago
- Windows Event Log Knowledge Base☆28Updated this week
- A set of tools for collecting forensic information☆27Updated 5 years ago
- Identifies metadata of .NET binary files.☆21Updated last year
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Updated 3 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- ☆12Updated 4 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 3 years ago
- Royal Road RTF Weaponizer object decoder☆24Updated last year
- ☆23Updated 4 years ago
- Documentation and parsers for different anti-virus quarantine formats.☆42Updated 5 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 3 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Updated 5 years ago
- Indicators of Normality☆11Updated 3 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- ☆30Updated 3 months ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆29Updated 3 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Updated 7 years ago
- ☆28Updated 4 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆25Updated 5 years ago
- ☆18Updated 6 years ago
- ☆13Updated 5 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 4 years ago