Assortment of hashing algorithms used in malware
☆391Feb 8, 2026Updated 3 weeks ago
Alternatives and similar repositories for hashdb
Users that are interested in hashdb are comparing it to the libraries listed below
Sorting:
- HashDB API hash lookup plugin for IDA Pro☆349Oct 9, 2025Updated 4 months ago
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆855Feb 2, 2024Updated 2 years ago
- Research notes☆132Dec 6, 2024Updated last year
- Quickly debug shellcode extracted during malware analysis☆626May 23, 2023Updated 2 years ago
- ☆32Apr 24, 2022Updated 3 years ago
- Windows kernel and user mode emulation.☆1,860Updated this week
- A Pin Tool for tracing API calls etc☆1,620Feb 8, 2026Updated 3 weeks ago
- Some of my publicly available Malware analysis and Reverse engineering.☆932Jun 3, 2024Updated last year
- Dynamic unpacker based on PE-sieve☆796Sep 13, 2025Updated 5 months ago
- Code snips and notes☆140Mar 10, 2022Updated 3 years ago
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆807Mar 16, 2024Updated last year
- High Octane Triage Analysis☆820Updated this week
- Binary Ninja plugin to identify obfuscated code and other interesting code constructs☆650Mar 14, 2025Updated 11 months ago
- Binary Ninja plugin for interacting with the OALabs HashDB service☆20Nov 1, 2024Updated last year
- ☆118Aug 7, 2022Updated 3 years ago
- A DTrace on Windows Reimplementation☆369Feb 3, 2026Updated 3 weeks ago
- ☆76Nov 30, 2023Updated 2 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,562Oct 31, 2025Updated 4 months ago
- IDA Python deobfuscation script for ConfuserEx binaries☆35Sep 15, 2022Updated 3 years ago
- Materials for Windows Malware Analysis training (volume 1)☆2,028Jul 1, 2024Updated last year
- Sleep Obfuscation☆816Dec 3, 2023Updated 2 years ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,844Updated this week
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,897Updated this week
- ☆153Jul 31, 2022Updated 3 years ago
- Exports monitoring plugin for x64dbg☆22Mar 14, 2023Updated 2 years ago
- Repository for officially supported Binary Ninja plugins☆57Updated this week
- Useful scripts for WinDbg using the debugger data model☆429Mar 27, 2024Updated last year
- Go symbol recovery tool☆935Updated this week
- IDApython Scripts for Analyzing Golang Binaries☆665Aug 8, 2024Updated last year
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,861Feb 1, 2026Updated last month
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆580Mar 8, 2024Updated last year
- A guide on how to write fast and memory friendly YARA rules☆166Feb 11, 2025Updated last year
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆585May 5, 2024Updated last year
- A Binary Genetic Traits Lexer Framework☆522Aug 14, 2025Updated 6 months ago
- An IDA Plugin that help analyzing module that use COM☆230Oct 10, 2025Updated 4 months ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆236Jun 22, 2023Updated 2 years ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,313Oct 31, 2025Updated 4 months ago
- IDA Pro utilities from FLARE team☆2,435Oct 29, 2024Updated last year
- Automatic YARA rule generation for Malpedia☆168Sep 8, 2022Updated 3 years ago