NozomiNetworks / upx-recovery-toolLinks
☆109Updated 2 years ago
Alternatives and similar repositories for upx-recovery-tool
Users that are interested in upx-recovery-tool are comparing it to the libraries listed below
Sorting:
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆155Updated last year
- A utility to fix intentionally corrupted UPX packed files.☆90Updated 2 years ago
- A command line Windows API tracing tool for Golang binaries.☆157Updated last year
- FLARE Team's Binary Navigator☆293Updated last month
- IDA Pro plugin for recognizing known hashes of API function names☆82Updated 3 years ago
- Static Binary Instrumentation tool for Windows x64 executables☆207Updated last month
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆118Updated 2 years ago
- Powershell script deobfuscation using AST in Python☆72Updated last month
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆71Updated last year
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆168Updated 2 weeks ago
- Parse .NET executable files.☆78Updated 2 months ago
- My write-up for challenge 11 flareon 9: unpacking pyarmor☆61Updated 3 years ago
- A collection of modules and scripts to help with analyzing Nim binaries☆81Updated last year
- Writeups for CTF challenges☆33Updated 2 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆120Updated last year
- ☆209Updated 2 years ago
- a PE Loader and Windows API tracer. Useful in malware analysis.☆143Updated 3 years ago
- How to retro theme your Ghidra☆35Updated last month
- Repository for the code snippets from the AllThingsIDA video channel☆118Updated last month
- Native Python3 bindings for @horsicq's Detect-It-Easy☆74Updated 6 months ago
- This IDA plugin extends the functionality of the assembly and hex view. With this plugin, you can conveniently decode/decrypt/alter data …☆85Updated 5 months ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆119Updated 8 months ago
- Use YARA rules on Time Travel Debugging traces☆95Updated 2 years ago
- VinCSS Reverse Engineering, Malware Analysing Tools & Ultilities☆27Updated 3 years ago
- IDA plugin for quickly copying disassembly as encoded hex bytes☆65Updated 3 years ago
- IDA plugin to pinpoint obfuscated code☆142Updated 3 years ago
- ☆83Updated 3 months ago
- Ghidra scripts for recovering string definitions in Go binaries☆122Updated last year
- HashDB API hash lookup plugin for IDA Pro☆340Updated last month
- Bindings for Microsoft WinDBG TTD☆232Updated 2 years ago