Generate MAEC XML from Ero Carrera's pefile output
☆15Mar 6, 2017Updated 8 years ago
Alternatives and similar repositories for pefile-to-maec
Users that are interested in pefile-to-maec are comparing it to the libraries listed below
Sorting:
- ☆14Jun 30, 2015Updated 10 years ago
- Debugger for HTC phones bootloader (HBOOT).☆20Nov 28, 2013Updated 12 years ago
- collection of scripts and stuff☆12Aug 15, 2016Updated 9 years ago
- ☆11Jun 10, 2015Updated 10 years ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- PE rebuilder, based on yoda's realigndll☆12Oct 1, 2011Updated 14 years ago
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Fuzzer☆43Oct 18, 2014Updated 11 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/verify-sigs☆18Sep 2, 2016Updated 9 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆18Oct 10, 2014Updated 11 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- Microsoft Edge MemGC Internals☆17Sep 2, 2015Updated 10 years ago
- Maltrace is a simple syscall tracer for Windows implemented through the use of PIN.☆24Apr 10, 2013Updated 12 years ago
- In memory fuzzing for embedded devices☆19Jun 20, 2012Updated 13 years ago
- SWF parser and AVM2 (Actionscript 3) bytecode parser☆19Mar 26, 2017Updated 8 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Apr 26, 2016Updated 9 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- A WDM Windows driver to issue IO to storage devices with asynchronous multithreaded processing☆21Aug 28, 2016Updated 9 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Oct 29, 2017Updated 8 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- IDASimulator is a plugin that extends IDA's conditional breakpoint support, making it easy to augment / replace complex executable code i…☆46Sep 2, 2014Updated 11 years ago
- Yara rules for quick reverse engineering of malware.☆19Dec 9, 2015Updated 10 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- WinEoP Exploitation Framework☆25Jan 7, 2016Updated 10 years ago
- Malware.lu tools☆63Oct 28, 2013Updated 12 years ago
- A(nother) Binary Analysis Framework☆30Jun 10, 2014Updated 11 years ago
- ☆23Jul 7, 2023Updated 2 years ago
- Alina POS Source Code + Rootkit☆23Nov 3, 2015Updated 10 years ago
- Yet another dynamic routine hooking library for OS X. Uses Mach exception handlers.☆11Feb 7, 2016Updated 10 years ago