Quickly debug shellcode extracted during malware analysis
☆631May 23, 2023Updated 2 years ago
Alternatives and similar repositories for BlobRunner
Users that are interested in BlobRunner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows kernel and user mode emulation.☆1,933Updated this week
- A Pin Tool for tracing API calls etc☆1,641Feb 8, 2026Updated 2 months ago
- Dynamic unpacker based on PE-sieve☆804Apr 1, 2026Updated last week
- IDA python plugin to scan binary with Yara rules☆181Jan 30, 2024Updated 2 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,606Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- IFL - Interactive Functions List (plugin for IDA Pro)☆491Feb 27, 2026Updated last month
- Converts PE into a shellcode☆2,751Aug 30, 2025Updated 7 months ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,905Apr 1, 2026Updated last week
- HashDB API hash lookup plugin for IDA Pro☆353Mar 12, 2026Updated last month
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,513Nov 15, 2023Updated 2 years ago
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆859Feb 2, 2024Updated 2 years ago
- ☆1,133Dec 19, 2023Updated 2 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆585May 5, 2024Updated last year
- Transfer EIP control to shellcode during malware analysis investigation☆77Oct 29, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A DTrace on Windows Reimplementation☆373Mar 12, 2026Updated last month
- ☆937Aug 14, 2025Updated 8 months ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,959Apr 2, 2026Updated last week
- Assortment of hashing algorithms used in malware☆394Feb 8, 2026Updated 2 months ago
- Labeless is a multipurpose IDA Pro plugin system for labels/comments synchronization with a debugger backend, with complex memory dumping…☆577Feb 23, 2026Updated last month
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,334Updated this week
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆759Nov 16, 2021Updated 4 years ago
- IDApython Scripts for Analyzing Golang Binaries☆667Aug 8, 2024Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,535Jul 8, 2025Updated 9 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆446Oct 26, 2022Updated 3 years ago
- IDA Pro utilities from FLARE team☆2,450Oct 29, 2024Updated last year
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆3,257Sep 3, 2022Updated 3 years ago
- A static analyzer for PE executables.☆1,117Mar 11, 2026Updated last month
- A VBA parser and emulation engine to analyze malicious macros.☆1,119Jul 10, 2024Updated last year
- AV/EDR evasion via direct system calls.☆2,001Jan 1, 2023Updated 3 years ago
- AV/EDR evasion via direct system calls.☆1,807Sep 3, 2022Updated 3 years ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,986Feb 24, 2025Updated last year
- Official x64dbg plugin for IDA Pro.☆556Sep 24, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A Binary Genetic Traits Lexer Framework☆525Updated this week
- ☆2,175Apr 3, 2026Updated last week
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,112Apr 2, 2026Updated last week
- Obfuscate specific windows apis with different apis☆1,021Feb 21, 2021Updated 5 years ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,940Updated this week
- A Coverage Explorer for Reverse Engineers☆2,535Feb 14, 2026Updated 2 months ago
- A memory scanning evasion technique☆899May 24, 2017Updated 8 years ago