OALabs / hashdbLinks
Assortment of hashing algorithms used in malware
☆373Updated 2 weeks ago
Alternatives and similar repositories for hashdb
Users that are interested in hashdb are comparing it to the libraries listed below
Sorting:
- A Binary Genetic Traits Lexer Framework☆515Updated last month
- Code snips and notes☆136Updated 3 years ago
- HashDB API hash lookup plugin for IDA Pro☆331Updated 3 months ago
- Research notes☆128Updated 9 months ago
- Dynamic unpacker based on PE-sieve☆753Updated 3 months ago
- Malduck is your ducky companion in malware analysis journeys☆342Updated 2 months ago
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆417Updated 2 months ago
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆833Updated last year
- Binary Ninja plugin to identify obfuscated code and other interesting code constructs☆632Updated 6 months ago
- A DTrace on Windows Reimplementation☆357Updated 7 months ago
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆166Updated this week
- ☆109Updated this week
- An automatic unpacker and logger for DotNet Framework targeting files☆256Updated 2 years ago
- FLARE Team's Binary Navigator☆277Updated last month
- A tutorial on how to write a packer for Windows!☆289Updated last year
- Time Travel Debugging IDA plugin☆591Updated last year
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆173Updated 5 months ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆152Updated last year
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆347Updated 5 months ago
- Important notes and topics on my journey towards mastering Windows Internals☆407Updated last year
- Python implementation of the Packed Executable iDentifier (PEiD)☆138Updated last year
- Some of my publicly available Malware analysis and Reverse engineering.☆824Updated last year
- A golang CLI tool to download malware from a variety of sources.☆150Updated 2 months ago
- ROPfuscator is a fine-grained code obfuscation framework for C/C++ programs using ROP (return-oriented programming).☆432Updated last year
- ☆109Updated 2 years ago
- My reversing tools. Some custom, some not.☆207Updated last year
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆434Updated last year
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆393Updated 5 months ago
- ☆113Updated last month
- Quickly debug shellcode extracted during malware analysis☆612Updated 2 years ago