NozomiNetworks / upx-recovery-toolLinks
☆105Updated 2 years ago
Alternatives and similar repositories for upx-recovery-tool
Users that are interested in upx-recovery-tool are comparing it to the libraries listed below
Sorting:
- A utility to fix intentionally corrupted UPX packed files.☆89Updated 2 years ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆152Updated last year
- A command line Windows API tracing tool for Golang binaries.☆156Updated last year
- IDA Pro plugin for recognizing known hashes of API function names☆81Updated 3 years ago
- FLARE Team's Binary Navigator☆271Updated last week
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆116Updated 2 years ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆72Updated last year
- Static Binary Instrumentation tool for Windows x64 executables☆207Updated 3 months ago
- Powershell script deobfuscation using AST in Python☆68Updated last year
- Parse .NET executable files.☆76Updated 3 weeks ago
- Use YARA rules on Time Travel Debugging traces☆92Updated 2 years ago
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆165Updated last month
- Native Python3 bindings for @horsicq's Detect-It-Easy☆72Updated 2 months ago
- Writeups for CTF challenges☆31Updated last year
- My write-up for challenge 11 flareon 9: unpacking pyarmor☆61Updated 2 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆117Updated last year
- A collection of modules and scripts to help with analyzing Nim binaries☆78Updated 10 months ago
- IDA plugin for quickly copying disassembly as encoded hex bytes☆62Updated 3 years ago
- ☆203Updated last year
- a PE Loader and Windows API tracer. Useful in malware analysis.☆143Updated 2 years ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆93Updated last week
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆115Updated 4 months ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆67Updated last year
- Bindings for Microsoft WinDBG TTD☆226Updated 2 years ago
- Repository for the code snippets from the AllThingsIDA video channel☆111Updated 2 months ago
- Ghidra scripts for recovering string definitions in Go binaries☆117Updated 8 months ago
- This IDA plugin extends the functionality of the assembly and hex view. With this plugin, you can conveniently decode/decrypt/alter data …☆84Updated 2 months ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆90Updated last year
- ☆74Updated last year
- How to retro theme your Ghidra☆35Updated 9 months ago