Quickly debug shellcode extracted during malware analysis
☆627May 23, 2023Updated 2 years ago
Alternatives and similar repositories for BlobRunner
Users that are interested in BlobRunner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows kernel and user mode emulation.☆1,896Mar 12, 2026Updated last week
- A Pin Tool for tracing API calls etc☆1,634Feb 8, 2026Updated last month
- Dynamic unpacker based on PE-sieve☆799Sep 13, 2025Updated 6 months ago
- IDA python plugin to scan binary with Yara rules☆181Jan 30, 2024Updated 2 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,576Oct 31, 2025Updated 4 months ago
- IFL - Interactive Functions List (plugin for IDA Pro)☆489Feb 27, 2026Updated 3 weeks ago
- Converts PE into a shellcode☆2,752Aug 30, 2025Updated 6 months ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,885Mar 1, 2026Updated 3 weeks ago
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆857Feb 2, 2024Updated 2 years ago
- HashDB API hash lookup plugin for IDA Pro☆354Mar 12, 2026Updated last week
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,511Nov 15, 2023Updated 2 years ago
- ☆1,134Dec 19, 2023Updated 2 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆585May 5, 2024Updated last year
- Transfer EIP control to shellcode during malware analysis investigation☆77Oct 29, 2014Updated 11 years ago
- A DTrace on Windows Reimplementation☆372Mar 12, 2026Updated last week
- ☆934Aug 14, 2025Updated 7 months ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,923Mar 17, 2026Updated last week
- Assortment of hashing algorithms used in malware☆396Feb 8, 2026Updated last month
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,319Oct 31, 2025Updated 4 months ago
- Labeless is a multipurpose IDA Pro plugin system for labels/comments synchronization with a debugger backend, with complex memory dumping…☆577Feb 23, 2026Updated last month
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆756Nov 16, 2021Updated 4 years ago
- IDApython Scripts for Analyzing Golang Binaries☆665Aug 8, 2024Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,501Jul 8, 2025Updated 8 months ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆446Oct 26, 2022Updated 3 years ago
- IDA Pro utilities from FLARE team☆2,441Oct 29, 2024Updated last year
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆3,257Sep 3, 2022Updated 3 years ago
- A static analyzer for PE executables.☆1,112Mar 11, 2026Updated last week
- A VBA parser and emulation engine to analyze malicious macros.☆1,117Jul 10, 2024Updated last year
- AV/EDR evasion via direct system calls.☆1,999Jan 1, 2023Updated 3 years ago
- AV/EDR evasion via direct system calls.☆1,797Sep 3, 2022Updated 3 years ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,969Feb 24, 2025Updated last year
- Official x64dbg plugin for IDA Pro.☆555Sep 24, 2024Updated last year
- A Binary Genetic Traits Lexer Framework☆525Updated this week
- ☆2,173Feb 21, 2023Updated 3 years ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,096Dec 9, 2025Updated 3 months ago
- Obfuscate specific windows apis with different apis☆1,023Feb 21, 2021Updated 5 years ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,890Updated this week
- A Coverage Explorer for Reverse Engineers☆2,515Feb 14, 2026Updated last month
- A memory scanning evasion technique☆901May 24, 2017Updated 8 years ago