adobe / obfuscation-detectionLinks
☆42Updated 2 months ago
Alternatives and similar repositories for obfuscation-detection
Users that are interested in obfuscation-detection are comparing it to the libraries listed below
Sorting:
- Symantec EDR Internals☆27Updated 3 years ago
- ☆38Updated 5 months ago
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆61Updated 2 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated last year
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆43Updated last year
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆105Updated last month
- Powershell script deobfuscation using AST in Python☆68Updated last year
- My scripts to deobfuscate APT32 malware☆27Updated 3 years ago
- QuasarRAT analysis tools and research report☆27Updated last year
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆63Updated last year
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Updated last year
- YARI is an interactive debugger for YARA Language.☆88Updated last month
- Repository of Yara rules created by the Stratosphere team☆26Updated 4 years ago
- Embed an executable as a PE resource, drops and launches it in runtime.☆61Updated 3 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆83Updated 2 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆73Updated 4 years ago
- Visually inspect and force decode YARA and regex matches found in both binary and text data. With Colors.☆136Updated last week
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- A small utility to deal with malware embedded hashes.☆52Updated last year
- Lazarus analysis tools and research report☆56Updated last year
- ☆52Updated 9 months ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Updated 6 months ago
- volatility explorer☆91Updated 4 years ago
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord…☆187Updated 4 years ago
- ☆22Updated last year
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆55Updated last week
- Use YARA rules on Time Travel Debugging traces☆92Updated 2 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Updated 2 years ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 4 years ago
- Windows (ShadowMove) Socket Duplication☆85Updated 5 years ago