Transfer EIP control to shellcode during malware analysis investigation
☆77Oct 29, 2014Updated 11 years ago
Alternatives and similar repositories for jmp2it
Users that are interested in jmp2it are comparing it to the libraries listed below
Sorting:
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- Quickly debug shellcode extracted during malware analysis☆626May 23, 2023Updated 2 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆145Apr 23, 2020Updated 5 years ago
- Smart DLL execution for malware analysis in sandbox systems☆144Feb 16, 2015Updated 11 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Miscellaneous tools written in Python, mostly centered around shellcodes.☆147Jun 21, 2015Updated 10 years ago
- DbgScript is a multi-script dbgeng (WinDbg, cdb, ntsd) extension. Use Python, Ruby or Lua to analyze data structures, or BYO provider.☆23Aug 15, 2016Updated 9 years ago
- ☆38Oct 23, 2015Updated 10 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Oct 11, 2020Updated 5 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- A collection of Volatility Framework plugins.☆26Aug 29, 2013Updated 12 years ago
- Simple RAT (only on own network) made in C++☆19Mar 11, 2013Updated 12 years ago
- Currently proof-of-concept☆17Dec 17, 2021Updated 4 years ago
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Jul 9, 2023Updated 2 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- Sublime Malware Research Tool☆66Oct 28, 2024Updated last year
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- Yaras Random☆24Feb 21, 2019Updated 7 years ago
- Rootkit Arsenal 2nd Source Code☆15Aug 6, 2013Updated 12 years ago
- Private set of tools for game hacking☆12Jan 25, 2015Updated 11 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Tool to view and create Microsoft shim database files (SDB).☆119May 11, 2017Updated 8 years ago
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 14 years ago
- Tool to help analyze PDF files☆192May 22, 2014Updated 11 years ago
- Scanner for Regin Virtual Filesystems☆25Jan 20, 2015Updated 11 years ago
- fiddler output to pcap☆41Mar 17, 2014Updated 11 years ago
- Autoruns plugin for the Volatility framework☆122Jul 18, 2019Updated 6 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Mar 8, 2017Updated 8 years ago
- Publicly shareable windows event log message data☆28Nov 29, 2019Updated 6 years ago
- ☆18Mar 20, 2017Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- A GC link parser for both linkfiles and jumplists.☆18Oct 28, 2016Updated 9 years ago
- Scanner for the SkeletonKey Malware☆30Jan 20, 2015Updated 11 years ago