SPTHvx / ezines
☆14Updated last year
Alternatives and similar repositories for ezines:
Users that are interested in ezines are comparing it to the libraries listed below
- Writeups for CTF challenges☆31Updated last year
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆114Updated 2 years ago
- TrashDBG the world's worse debugger☆23Updated 3 years ago
- Winbindex bot to pull in binaries for specific releases☆47Updated last year
- ☆73Updated last year
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆70Updated last year
- A small tool to unmap PE memory dumps.☆11Updated last year
- Use YARA rules on Time Travel Debugging traces☆88Updated last year
- MalUnpack companion driver☆98Updated 10 months ago
- ☆61Updated 9 months ago
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- UnpacMe IDA Byte Search☆28Updated last year
- ☆47Updated 2 years ago
- SPI flash read MitM attack PoC☆37Updated 2 years ago
- Powershell Linter☆50Updated 2 weeks ago
- Get information about stripped rust executables☆29Updated last week
- Rule Engine for Dynamic Malware Analysis and Research☆18Updated this week
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- ☆113Updated 2 months ago
- ☆25Updated 5 months ago
- API Logger for Windows Executables☆78Updated 4 years ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆91Updated last month
- This repository contains D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation.☆35Updated 4 years ago
- Helper idapython code for reversing kmdf drivers☆72Updated 2 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆116Updated 9 months ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆54Updated 2 years ago
- A few examples of how to trap virtual memory access on Windows.☆29Updated 4 months ago
- Metadata hash incorporating the Rich Header for robustness against packing and other malware tricks☆64Updated 3 years ago
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆109Updated 3 years ago
- ☆31Updated 2 years ago