K2 / RelocLinks
Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries and ensure a cryptographically secure hash match for code running on your legacy systems. A client tool that downloads relocation data for various PE files. This ensures when extracting data from memory dump…
☆12Updated 9 years ago
Alternatives and similar repositories for Reloc
Users that are interested in Reloc are comparing it to the libraries listed below
Sorting:
- IDApro idc and idapython script collection☆28Updated 2 years ago
- ☆27Updated 3 years ago
- x64 Windows Software Fault Injection Tool☆17Updated 8 years ago
- RemoteBridge is a library that allows you to access internal COM and JAVA objects used by third-party applications remotely.☆35Updated 8 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- Summit Route End Point Protection - Client code☆16Updated 9 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Updated 7 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 11 years ago
- Redress Dissassembler is a cross platform binary disassembler written in Java with Capstone bindings☆24Updated 9 years ago
- ☆30Updated 8 years ago
- Misc Python tools or PoCs. Mainly focused in helping RE, fuzzing☆20Updated 13 years ago
- IDAPython script in order to auto-rename subs☆20Updated 8 years ago
- IDASimulator is a plugin that extends IDA's conditional breakpoint support, making it easy to augment / replace complex executable code i…☆46Updated 11 years ago
- The plugin is an integration of Virus Battle API to the well known IDA Disassembler.☆20Updated 10 years ago
- IDA recompiler☆31Updated 11 years ago
- python inspect rootkit tool☆33Updated 12 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- Download all of Microsoft's security updates and symbols☆42Updated 9 years ago
- vstruct based dissectors for various file/protocol formats☆15Updated 8 years ago
- zer0m0n driver for cuckoo sandbox☆24Updated 10 years ago
- Tool to analyze 64-bit binaries with 32-bit Hex-Rays Decompiler☆79Updated 10 years ago
- Grep-like WinDbg extension☆45Updated 8 years ago
- Code coverage analysis tools for the PIN Toolkit☆60Updated 12 years ago
- The educational Animus malware☆18Updated 6 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Updated 9 years ago
- Collection of IDA Pro plugins I wrote over the years☆24Updated 15 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36Updated 9 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 9 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Updated 12 years ago