Necrosys / zerowine-tryoutLinks
Zero Wine Tryouts: An open source malware analysis tool
☆17Updated 9 years ago
Alternatives and similar repositories for zerowine-tryout
Users that are interested in zerowine-tryout are comparing it to the libraries listed below
Sorting:
- ☆24Updated 5 years ago
- ☆22Updated 4 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 7 years ago
- Rekall Memory Forensic Framework☆32Updated 5 years ago
- SDBbot Unpacker Python 2.7☆9Updated 4 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 7 years ago
- ☆13Updated 7 years ago
- ☆34Updated 3 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆11Updated 9 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Updated 9 years ago
- ☆20Updated 5 years ago
- My conference presentations and publications☆26Updated 3 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆29Updated 8 years ago
- ☆45Updated 7 years ago
- ☆26Updated 5 years ago
- Library for Windows XML Event Log (EVTX) data types☆18Updated 9 months ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 4 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- Common Malware Techniques☆13Updated 2 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Utilities for working with vivisect☆25Updated 3 months ago
- A set of small utilities, helpers for PIN tracers☆33Updated last year
- 🐧 A simple kernel-level rootkit☆20Updated 9 years ago
- ☆13Updated 8 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 5 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆35Updated 3 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- A wrapper for capstone for bearparser☆14Updated 2 years ago
- Debugger checks in 3 ways☆20Updated 7 years ago