Quickly debug shellcode extracted during malware analysis
☆634May 23, 2023Updated 2 years ago
Alternatives and similar repositories for BlobRunner
Users that are interested in BlobRunner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows kernel and user mode emulation.☆1,949Apr 8, 2026Updated 3 weeks ago
- A Pin Tool for tracing API calls etc☆1,649Feb 8, 2026Updated 2 months ago
- Dynamic unpacker based on PE-sieve☆810Apr 14, 2026Updated 2 weeks ago
- IDA python plugin to scan binary with Yara rules☆181Jan 30, 2024Updated 2 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,646Apr 18, 2026Updated 2 weeks ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- IFL - Interactive Functions List (plugin for IDA Pro)☆491Feb 27, 2026Updated 2 months ago
- Converts PE into a shellcode☆2,760Aug 30, 2025Updated 8 months ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,943Apr 1, 2026Updated last month
- HashDB API hash lookup plugin for IDA Pro☆355Mar 12, 2026Updated last month
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,519Nov 15, 2023Updated 2 years ago
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆860Feb 2, 2024Updated 2 years ago
- ☆1,134Dec 19, 2023Updated 2 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆585May 5, 2024Updated last year
- Transfer EIP control to shellcode during malware analysis investigation☆77Oct 29, 2014Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A DTrace on Windows Reimplementation☆373Apr 22, 2026Updated last week
- ☆941Aug 14, 2025Updated 8 months ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,982Apr 23, 2026Updated last week
- Assortment of hashing algorithms used in malware☆397Feb 8, 2026Updated 2 months ago
- Labeless is a multipurpose IDA Pro plugin system for labels/comments synchronization with a debugger backend, with complex memory dumping…☆578Feb 23, 2026Updated 2 months ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,351Apr 18, 2026Updated 2 weeks ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆761Nov 16, 2021Updated 4 years ago
- IDApython Scripts for Analyzing Golang Binaries☆669Aug 8, 2024Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,562Jul 8, 2025Updated 9 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆448Oct 26, 2022Updated 3 years ago
- IDA Pro utilities from FLARE team☆2,452Oct 29, 2024Updated last year
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆3,274Sep 3, 2022Updated 3 years ago
- A static analyzer for PE executables.☆1,122Mar 11, 2026Updated last month
- A Binary Genetic Traits Lexer Framework☆567Updated this week
- AV/EDR evasion via direct system calls.☆2,008Jan 1, 2023Updated 3 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,120Jul 10, 2024Updated last year
- AV/EDR evasion via direct system calls.☆1,814Sep 3, 2022Updated 3 years ago
- Official x64dbg plugin for IDA Pro.☆562Sep 24, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,995Feb 24, 2025Updated last year
- ☆2,187Apr 3, 2026Updated last month
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,121Apr 2, 2026Updated last month
- Obfuscate specific windows apis with different apis☆1,021Feb 21, 2021Updated 5 years ago
- A memory scanning evasion technique☆901May 24, 2017Updated 8 years ago
- A Coverage Explorer for Reverse Engineers☆2,539Feb 14, 2026Updated 2 months ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,982Updated this week