Invoke-RE / ungarble_bn
Binary Ninja plugin to deobfuscate strings obfuscated with the Garble project
☆14Updated 3 weeks ago
Alternatives and similar repositories for ungarble_bn:
Users that are interested in ungarble_bn are comparing it to the libraries listed below
- A few examples of how to trap virtual memory access on Windows.☆28Updated 3 months ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆34Updated last year
- Custom instruction length for hex-rays☆18Updated 2 months ago
- ☆25Updated 4 months ago
- Helper idapython code for reversing kmdf drivers☆72Updated 2 years ago
- ☆28Updated 4 years ago
- A KISS Rust crate to parse Windows kernel crash-dumps created by Windows & its debugger.☆33Updated last month
- ☆30Updated 2 weeks ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆20Updated 4 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- Process Injection without R/W target memory and without creating a remote thread☆18Updated 3 years ago
- ☆45Updated 4 years ago
- PyKD DLLs for x86 and x64 platforms☆17Updated last year
- WslinkVMAnalyzer is a tool to facilitate analysis of code protected by a virtual machine featured in Wslink malware☆45Updated 2 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆33Updated last year
- Command like tool to print mitigation flags for running processes in a memory dump☆46Updated 4 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆97Updated 4 years ago
- ☆23Updated last year
- Currently proof-of-concept☆16Updated 3 years ago
- Playing with LLVM passes☆36Updated last year
- javascript extension of windbg for hacker.☆15Updated last year
- Report and exploit of CVE-2024-21305.☆35Updated last year
- ☆23Updated last year
- ☆18Updated 4 years ago
- Rule Engine for Dynamic Malware Analysis and Research☆15Updated last week
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆26Updated 2 years ago
- A set of small utilities, helpers for PIN tracers☆31Updated last year
- ☆29Updated 3 years ago