Neo23x0 / ReginScanner
Scanner for Regin Virtual Filesystems
☆26Updated 10 years ago
Alternatives and similar repositories for ReginScanner:
Users that are interested in ReginScanner are comparing it to the libraries listed below
- Malware analyses and helpful scripts☆29Updated 2 years ago
- Shellcode tracer☆15Updated 8 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- My manual analysis of malware families☆13Updated 7 years ago
- A simple shellcode runner☆20Updated 11 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- Anti-AV compilation☆42Updated 11 years ago
- ☆28Updated 7 years ago
- Win32 Shellcodes☆9Updated 7 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 12 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- Malware monitor template based on MinHook☆16Updated 10 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 10 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 9 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- a collection of yara rules for binary analysis☆24Updated 7 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆13Updated 9 years ago
- ☆10Updated 7 years ago
- Malpimp is an advanced API tracing tool and designed to automate the reverse engineering process. In the backend it uses pydbg to hook t…☆8Updated 8 years ago
- This is a copy of the Registry Decoder Live repository from Google Code☆9Updated 9 years ago
- A collection of tools mostly written in Python.☆15Updated 10 years ago
- ☆13Updated 7 years ago
- ☆22Updated 7 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 8 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- Spy Agency Teasing☆14Updated 10 years ago
- A simple exploitable ActiveX control for RE/VR☆19Updated 10 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago