Internet-2-0 / Malcore-x64dbgLinks
This x64dbg plugin allows you to upload your sample to Malcore and view the results.
☆36Updated 2 years ago
Alternatives and similar repositories for Malcore-x64dbg
Users that are interested in Malcore-x64dbg are comparing it to the libraries listed below
Sorting:
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated 2 years ago
- ☆24Updated last year
- ☆31Updated 11 months ago
- MalUnpack companion driver☆99Updated last year
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated 2 years ago
- Neutralize KEPServerEX anti-debugging techniques☆33Updated 2 years ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆118Updated 2 years ago
- Rule Engine for Dynamic Malware Analysis and Research☆25Updated 9 months ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆128Updated 11 months ago
- ☆72Updated 2 years ago
- A post-processing script for TinyTracer☆39Updated 2 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆124Updated last year
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 3 years ago
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆36Updated 4 years ago
- Recon 2023 slides and code☆80Updated 2 years ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆18Updated 2 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago
- ☆76Updated 2 years ago
- ☆32Updated 3 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆63Updated last year
- Windows kernel PDB data parsed into YAML☆42Updated 3 months ago
- ☆28Updated 2 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆115Updated 2 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆27Updated 3 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆36Updated 4 years ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆70Updated 4 months ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆27Updated 2 years ago
- A driver to implement IOCTL hooking☆27Updated 3 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Updated 2 years ago
- Winbindex bot to pull in binaries for specific releases☆48Updated 2 years ago