Internet-2-0 / Malcore-x64dbgLinks
This x64dbg plugin allows you to upload your sample to Malcore and view the results.
☆37Updated 2 years ago
Alternatives and similar repositories for Malcore-x64dbg
Users that are interested in Malcore-x64dbg are comparing it to the libraries listed below
Sorting:
- ☆26Updated 11 months ago
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated 2 years ago
- MalUnpack companion driver☆99Updated last year
- A post-processing script for TinyTracer☆37Updated 2 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆11Updated 2 years ago
- ☆71Updated 2 years ago
- Neutralize KEPServerEX anti-debugging techniques☆32Updated 2 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆56Updated 3 years ago
- Rule Engine for Dynamic Malware Analysis and Research☆25Updated 5 months ago
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆35Updated 3 years ago
- An x64dbg plugin which marks XFG call signatures as data☆77Updated 2 years ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆18Updated 2 years ago
- ☆32Updated 7 months ago
- Windows kernel PDB data parsed into YAML☆41Updated 10 months ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆51Updated 3 weeks ago
- ☆32Updated 3 years ago
- Recon 2023 slides and code☆79Updated 2 years ago
- A journal for $6,000 Riot Vanguard bounty.☆65Updated 2 years ago
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 3 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆27Updated 3 years ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆117Updated 2 years ago
- ☆74Updated last year
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆112Updated 2 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆121Updated last year
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆62Updated last year
- Report and exploit of CVE-2023-36427☆88Updated last year
- bypassing intel txt's tboot integrity checks via coreboot shim☆81Updated 6 months ago
- Code from process of reversing Sysinternals Suite for educational purposes, with videos to associate them☆48Updated 2 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Updated 2 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆35Updated 3 years ago