☆23May 23, 2024Updated last year
Alternatives and similar repositories for Malware-IDAPython-Scripts
Users that are interested in Malware-IDAPython-Scripts are comparing it to the libraries listed below
Sorting:
- A Simple ShellcodeLoader☆11Jun 4, 2021Updated 4 years ago
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Unpacking and decryption tools for the Emotet malware☆44Dec 5, 2021Updated 4 years ago
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Dec 9, 2022Updated 3 years ago
- ☆11Feb 12, 2023Updated 3 years ago
- ☆26Sep 29, 2022Updated 3 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- Currently proof-of-concept☆17Dec 17, 2021Updated 4 years ago
- A debugger backend for IDA Pro built on top of of Intel’s PIN framework☆35Feb 17, 2024Updated 2 years ago
- IDAPatternSearch adds a capability of finding functions according to bit-patterns into the well-known IDA Pro disassembler based on Ghidr…☆66Sep 14, 2021Updated 4 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆15Apr 15, 2023Updated 2 years ago
- User-friendly reference finder in IDA☆39Dec 17, 2022Updated 3 years ago
- this is Crytolocket Malware Domain Generation Algorithm (DGA). Cryptolocker uses DGA to generate 1000 to 10000 unique domain names for it…☆14Sep 5, 2016Updated 9 years ago
- Miscellaneous exploit scripts☆17May 24, 2022Updated 3 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆68Aug 11, 2023Updated 2 years ago
- CVE-2022-33980 Apache Commons Configuration 远程命令执行漏洞☆44Jul 8, 2022Updated 3 years ago
- Statically unpacking common android banker malware.☆160Apr 2, 2025Updated 10 months ago
- ☆76Nov 30, 2023Updated 2 years ago
- ☆12May 31, 2022Updated 3 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- Read my blog for more info -☆31Apr 27, 2021Updated 4 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆106Jun 11, 2025Updated 8 months ago
- SBLoader is a memory patcher to patch and execute the child process under the desired parent process.☆14Jun 25, 2022Updated 3 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- IDA python plugin to scan binary with Yara rules☆180Jan 30, 2024Updated 2 years ago
- ☆127Feb 9, 2026Updated 2 weeks ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- Socks Proxy Server Plugin for Invoke-SocksProxy☆18Mar 24, 2025Updated 11 months ago
- IDA Pro plugin to aid with the analysis of native IIS modules☆21Aug 1, 2024Updated last year
- Recon 2023 slides and code☆79Jun 9, 2023Updated 2 years ago
- ☆16Mar 26, 2024Updated last year
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆46Nov 16, 2020Updated 5 years ago
- IDA Pro plugin for recognizing known hashes of API function names☆83May 12, 2022Updated 3 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Feb 12, 2023Updated 3 years ago
- Defanger is a Notepad++ plugin that defangs/refangs malicious IOCs.☆25Jun 18, 2023Updated 2 years ago
- Binary Ninja plugin for exploring Structured Exception Handlers☆83Jun 6, 2024Updated last year