NexusFuzzy / NanoDumpLinks
Tool to decrypt the configuration of NanoCore and dump all used plugins
☆11Updated 4 years ago
Alternatives and similar repositories for NanoDump
Users that are interested in NanoDump are comparing it to the libraries listed below
Sorting:
- ☆23Updated 5 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- Royal Road RTF Weaponizer object decoder☆24Updated 10 months ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 5 years ago
- A small utility to deal with malware embedded hashes.☆52Updated last year
- Generates YARA rules to detect malware using API hashing☆17Updated 4 years ago
- A collection of shellcode hashes☆17Updated 6 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- ☆22Updated 4 years ago
- ☆22Updated 2 years ago
- Small visualizator for PE files☆69Updated last year
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 4 years ago
- QuasarRAT analysis tools and research report☆27Updated last year
- open source malware analysis and research notes dump☆26Updated last year
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Updated 6 years ago
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- Specialized tool to dump Position Independent Code.☆22Updated 5 years ago
- Help deobfuscate VBScript☆15Updated 3 years ago
- Rekall Memory Forensic Framework☆32Updated 6 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆14Updated 5 years ago
- A modular Karton Framework service that unpacks common packers like UPX and others using the Qiling Framework.☆57Updated 4 years ago
- ☆73Updated last year
- ☆24Updated last year
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆55Updated 3 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆26Updated 3 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- Sysmon shenanigans☆66Updated 4 years ago
- Unpacking and decryption tools for the Emotet malware☆45Updated 3 years ago