NexusFuzzy / NanoDumpLinks
Tool to decrypt the configuration of NanoCore and dump all used plugins
☆11Updated 4 years ago
Alternatives and similar repositories for NanoDump
Users that are interested in NanoDump are comparing it to the libraries listed below
Sorting:
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- A small utility to deal with malware embedded hashes.☆52Updated last year
- Royal Road RTF Weaponizer object decoder☆24Updated 9 months ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 5 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- Rekall Memory Forensic Framework☆32Updated 5 years ago
- open source malware analysis and research notes dump☆26Updated last year
- QuasarRAT analysis tools and research report☆27Updated last year
- Specialized tool to dump Position Independent Code.☆22Updated 4 years ago
- ☆22Updated 4 years ago
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- ☆73Updated last year
- ETWNetMonv3 is simple C# code for Monitoring TCP Network Connection via ETW & ETWProcessMon/2 is for Monitoring Process/Thread/Memory/Ima…☆40Updated 2 years ago
- A repository where I share my injection implemintations☆29Updated 4 years ago
- TA505 unpacker Python 2.7☆47Updated 5 years ago
- A collection of shellcode hashes☆17Updated 6 years ago
- Small visualizator for PE files☆69Updated last year
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆55Updated 3 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 4 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- Unpacking and decryption tools for the Emotet malware☆46Updated 3 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆14Updated 4 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Updated 6 years ago
- ☆22Updated 2 years ago
- ☆21Updated 4 years ago
- ☆28Updated 8 months ago
- Generates YARA rules to detect malware using API hashing☆17Updated 4 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆55Updated 5 months ago