Necrosys / zerowine-tryoutLinks
Zero Wine Tryouts: An open source malware analysis tool
☆17Updated 9 years ago
Alternatives and similar repositories for zerowine-tryout
Users that are interested in zerowine-tryout are comparing it to the libraries listed below
Sorting:
- ☆24Updated 5 years ago
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆11Updated 9 years ago
- ☆22Updated 4 years ago
- Rekall Memory Forensic Framework☆32Updated 5 years ago
- Library for Windows XML Event Log (EVTX) data types☆18Updated 8 months ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- My conference presentations and publications☆26Updated 3 years ago
- ☆13Updated 7 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆29Updated 8 years ago
- ☆45Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- ☆34Updated 3 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 7 years ago
- SDBbot Unpacker Python 2.7☆9Updated 4 years ago
- Kernel Shellcode to add all privileges in token☆13Updated 8 years ago
- A wrapper for capstone for bearparser☆14Updated 2 years ago
- ☆20Updated 5 years ago
- Experimental Windows .text section Patch Detector☆21Updated 10 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Updated 9 years ago
- 🐧 A simple kernel-level rootkit☆20Updated 9 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- Common Malware Techniques☆13Updated 2 years ago
- A collection of anti disassembly techniques☆19Updated 7 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- A set of small utilities, helpers for PIN tracers☆33Updated last year
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 7 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- Analysis of VBS exploit CVE-2018-8174☆31Updated 6 years ago
- Slides of 44Con 2018☆21Updated 6 years ago