Internet-2-0 / Malcore-x64dbgLinks
This x64dbg plugin allows you to upload your sample to Malcore and view the results.
☆37Updated 2 years ago
Alternatives and similar repositories for Malcore-x64dbg
Users that are interested in Malcore-x64dbg are comparing it to the libraries listed below
Sorting:
- ☆25Updated 8 months ago
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated 2 years ago
- Neutralize KEPServerEX anti-debugging techniques☆32Updated 2 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆54Updated 3 years ago
- ☆31Updated 3 years ago
- Windows kernel PDB data parsed into YAML☆39Updated 8 months ago
- A post-processing script for TinyTracer☆36Updated 2 years ago
- MalUnpack companion driver☆98Updated last year
- ☆73Updated last year
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 3 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆26Updated 3 years ago
- A journal for $6,000 Riot Vanguard bounty.☆64Updated last year
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated last year
- A Practical example of ELAM (Early Launch Anti-Malware)☆34Updated 3 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆105Updated 2 years ago
- ☆31Updated 4 months ago
- ☆71Updated 2 years ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆116Updated 2 years ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆18Updated 2 years ago
- IDA Python deobfuscation script for ConfuserEx binaries☆35Updated 2 years ago
- Rule Engine for Dynamic Malware Analysis and Research☆22Updated 2 months ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆122Updated 5 months ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆70Updated 4 months ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆117Updated last year
- ☆25Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated last year
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆34Updated 3 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆72Updated last year
- A DLL Injection Detector for Windows☆64Updated 2 weeks ago
- An x64dbg plugin which marks XFG call signatures as data☆77Updated 2 years ago