OALabs / PyIATRebuildLinks
Automatically rebuild Import Address Table for dumped PE file. With python bindings!
☆120Updated 6 years ago
Alternatives and similar repositories for PyIATRebuild
Users that are interested in PyIATRebuild are comparing it to the libraries listed below
Sorting:
- Parsers for custom malware formats ("Funky malware formats")☆96Updated 3 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆75Updated 10 years ago
- ☆115Updated 8 years ago
- IDA python plugin to scan binary with Yara rules☆177Updated last year
- Driver Initial Reconnaissance Tool☆123Updated 5 years ago
- Script analysis tool based on Frida.re☆128Updated 8 years ago
- Windows API tracer for malware (oldname: unitracer)☆118Updated 7 years ago
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆184Updated 4 years ago
- my results for the exercises in the book "Practical Reverse Engineering" by Bruce Dang et al.☆111Updated 10 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆91Updated 6 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆123Updated 4 years ago
- FLARE Kernel Shellcode Loader☆178Updated 6 years ago
- Official VirusTotal plugin for IDA Pro☆157Updated last year
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆85Updated 3 years ago
- Use this library to automatically extract PE files compressed with aplib from a binary blob.☆34Updated 6 years ago
- This project aims at simplifying Windows API import recovery on arbitrary memory dumps☆250Updated 2 years ago
- Windows Crypto API compatible decryption/encryption for python☆49Updated 2 years ago
- Static unpacker for FinSpy VM☆101Updated 4 years ago
- ☆71Updated last year
- Generating YARA rules based on binary code☆213Updated 3 years ago
- An IDA Pro extension for easier (malware) reverse engineering☆115Updated 2 years ago
- BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)☆125Updated 3 years ago
- Blackhat 2012 Sample Codes☆93Updated 9 years ago
- Frida.re based RunPE (and MapViewOfSection) extraction tool☆112Updated 8 years ago
- IDA Plugin which decodes Windows Device I/O control code into DeviceType, FunctionCode, AccessType and MethodType.☆111Updated last year
- ☆106Updated 6 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆184Updated 6 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Updated 5 years ago
- ☆99Updated last year
- Loading unsigned code into kernel in Windows 10 (64) with help of VMware Workstation Pro/Player design flaw☆138Updated 8 years ago