K2 / Reloc
Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries and ensure a cryptographically secure hash match for code running on your legacy systems. A client tool that downloads relocation data for various PE files. This ensures when extracting data from memory dump…
☆11Updated 9 years ago
Alternatives and similar repositories for Reloc:
Users that are interested in Reloc are comparing it to the libraries listed below
- ☆28Updated 7 years ago
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 6 years ago
- x64 Windows Software Fault Injection Tool☆17Updated 7 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- ☆27Updated 2 years ago
- Tool to resolve symbols by the address of the binary☆15Updated 6 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆33Updated 8 years ago
- Summit Route End Point Protection - Client code☆17Updated 8 years ago
- Malware analyses and helpful scripts☆29Updated 2 years ago
- IDApro idc and idapython script collection☆28Updated last year
- Collection of IDA Pro plugins I wrote over the years☆23Updated 14 years ago
- 🐧 A simple kernel-level rootkit☆20Updated 8 years ago
- Summit Route End Point Protection - Server code☆12Updated 8 years ago
- An IdaPython tool for getting syscall's ID and function name from ntdll.dll, user32.dll, and so on.☆12Updated 8 years ago
- CVE-2014-0816☆24Updated 8 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆13Updated 10 years ago
- Automated library compilation and PDB annotation with CMake and IDA Pro☆20Updated 6 years ago
- C code metamorphic obfuscator