Techlord-RCE / VB-Exe-ParserLinks
VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, Sub, Function, ...
☆18Updated 9 years ago
Alternatives and similar repositories for VB-Exe-Parser
Users that are interested in VB-Exe-Parser are comparing it to the libraries listed below
Sorting:
- ☆34Updated 8 years ago
- Plugin for x64dbg to generate Yara rules from function basic blocks.☆37Updated 8 years ago
- libemu shim layer and win32 environment for Unicorn Engine☆73Updated 8 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 8 years ago
- Use WinDBG to trace the Windows API calls of any Portable Executable file☆32Updated 8 years ago
- ☆34Updated 4 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Static analysis tools for x86 assembly☆13Updated 8 years ago
- analysis of visual basic code☆46Updated 7 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Updated 10 years ago
- API logger plugin for Intel Pintool☆14Updated 8 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Updated 11 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Updated 8 years ago
- ☆34Updated 7 years ago
- CAPE monitor DLLs☆41Updated 6 years ago
- Malware analyses and helpful scripts☆29Updated 3 years ago
- Analysis PE file or Shellcode☆50Updated 9 years ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆76Updated 6 years ago
- IDA plugin to explore and browse tags☆56Updated 6 years ago
- Intel PIN rocks☆15Updated 13 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Updated 13 years ago
- MALM: Malware Monitor☆49Updated 12 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 7 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Updated 6 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Updated 8 years ago
- ☆13Updated 8 years ago
- Windows build files for the VMHunt Intel PIN Trace tool☆19Updated 7 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆43Updated 6 years ago
- Framework complet d'analyse de malware☆12Updated 9 years ago