VinCSS Reverse Engineering, Malware Analysing Tools & Ultilities
☆27Nov 26, 2021Updated 4 years ago
Alternatives and similar repositories for VinCSS-RE-Tools-Ultilities
Users that are interested in VinCSS-RE-Tools-Ultilities are comparing it to the libraries listed below
Sorting:
- Các IDA Flirt signatures HTC tạo☆20Oct 21, 2024Updated last year
- Delphi-Kawaii is a plugin for Ida Pro.☆22Jul 19, 2023Updated 2 years ago
- ☆13Sep 26, 2021Updated 4 years ago
- Writeups/exploit code for CTFs I've done☆13Aug 29, 2021Updated 4 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- A debugger backend for IDA Pro built on top of of Intel’s PIN framework☆35Feb 17, 2024Updated 2 years ago
- ☆17Feb 23, 2023Updated 3 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Jun 30, 2023Updated 2 years ago
- ☆69Nov 19, 2024Updated last year
- TS-Changer - Forces the machine in/out of TestSigning Mode at runtime.☆64Aug 14, 2023Updated 2 years ago
- SBLoader is a memory patcher to patch and execute the child process under the desired parent process.☆14Jun 25, 2022Updated 3 years ago
- IDA Pro plugin for recognizing known hashes of API function names☆83May 12, 2022Updated 3 years ago
- Code Deobfuscator x86_32/64☆52Aug 16, 2022Updated 3 years ago
- the Open Source and Pure C++ Packer for eXecutables☆21Mar 25, 2023Updated 2 years ago
- A collection of anti disassembly techniques☆20Jul 22, 2017Updated 8 years ago
- UnpacMe IDA Byte Search☆29Nov 20, 2023Updated 2 years ago
- ☆10Jan 18, 2024Updated 2 years ago
- Example deobfuscate .NET Reactor 6.3.0.0 strings(ONLY STRINGS)☆21Aug 23, 2020Updated 5 years ago
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆20Dec 25, 2017Updated 8 years ago
- Occasional write-ups from Capture the Flag (CTF) competitions (mostly pwn).☆20Jun 16, 2024Updated last year
- Dump .net assembly from a native loader which uses ClrCreateinstance☆57Oct 18, 2022Updated 3 years ago
- ☆28Oct 4, 2021Updated 4 years ago
- WS2_32 Proxy DLL Perfect for hooking any game you wish to log packets / inject packets etc..☆25Updated this week
- Debug IDAPython in VSCode☆27Mar 20, 2023Updated 2 years ago
- ☆29May 4, 2021Updated 4 years ago
- IDAPatternSearch adds a capability of finding functions according to bit-patterns into the well-known IDA Pro disassembler based on Ghidr…☆66Sep 14, 2021Updated 4 years ago
- Modified python version of Rolf Rolles' https://github.com/RolfRolles/HexRaysDeob to unflatten Emotet'S Control Flow Flattening☆27May 5, 2022Updated 3 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆32Dec 31, 2024Updated last year
- Basic packer using XOR encryption☆31Mar 29, 2024Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Jan 30, 2026Updated last month
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆68Aug 11, 2023Updated 2 years ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65May 1, 2023Updated 2 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆33Feb 2, 2026Updated last month
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Apr 14, 2023Updated 2 years ago
- Resources for learning malware analysis and reverse engineering☆144Feb 7, 2024Updated 2 years ago
- ☆32Jul 14, 2025Updated 7 months ago
- IDA Plugin that fills in missing indirect CALL & JMP target information☆144Feb 15, 2026Updated 2 weeks ago
- Corana is a Dynamic Symbolic Execution Engine for ARM Cortex-M aiming to incrementally reconstruct the precise Control Flow Graph (CFG) o…☆29Mar 6, 2024Updated last year
- Import DynamoRIO drcov code coverage data into Ghidra☆44Dec 21, 2023Updated 2 years ago