RichHeaderResearch / RichPELinks
Metadata hash incorporating the Rich Header for robustness against packing and other malware tricks
☆65Updated 3 years ago
Alternatives and similar repositories for RichPE
Users that are interested in RichPE are comparing it to the libraries listed below
Sorting:
- ☆71Updated last year
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆73Updated last year
- Transfer EIP control to shellcode during malware analysis investigation☆75Updated 10 years ago
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- This tool is the result of a reverse engineering process of the Windows service called SysMain. Time to interact with the prefetch files …☆31Updated 4 years ago
- Parsers for custom malware formats ("Funky malware formats")☆96Updated 3 years ago
- Capa analysis importer for Ghidra.☆61Updated 4 years ago
- Enumerate Windows Defender threat families and dump their names according category☆90Updated 6 years ago
- Small visualizator for PE files☆69Updated last year
- TA505 unpacker Python 2.7☆47Updated 5 years ago
- Parse .NET executable files.☆76Updated this week
- API Logger for Windows Executables☆78Updated 4 years ago
- A golang CLI tool to download malware from a variety of sources.☆148Updated 2 weeks ago
- Scripts to aid analysis of files obfuscated with ScatterBee.☆22Updated 2 years ago
- Malware Configuration Extraction Modules☆50Updated last year
- Parse Microsoft shim databases☆30Updated 6 months ago
- ☆106Updated last year
- Alternative YARA scanning engine☆71Updated 2 years ago
- mod to myaut2exe decompiler☆15Updated 7 years ago
- Set of antianalysis techniques found in malware☆132Updated last year
- Tools for inspecting YARA bytecode☆17Updated 5 years ago
- Use this library to automatically extract PE files compressed with aplib from a binary blob.☆34Updated 6 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- TrashDBG the world's worse debugger☆23Updated 3 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆38Updated 2 years ago
- ☆66Updated 6 years ago
- Windows Drivers☆99Updated 6 years ago
- Use YARA rules on Time Travel Debugging traces☆92Updated 2 years ago
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆109Updated 4 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Updated 5 years ago