alexander-hanel / hanselLinks
Hansel - a simple but flexible search for IDA
☆26Updated 5 years ago
Alternatives and similar repositories for hansel
Users that are interested in hansel are comparing it to the libraries listed below
Sorting:
- IDARay is an IDA Pro plugin that matches the database against multiple YARA files which themselves may contain multiple rules.☆18Updated 6 years ago
- A python script that can be used to scan data within in an IDB using Yara.☆23Updated 6 years ago
- Flare-On solutions☆36Updated 5 years ago
- My conference presentations and publications☆26Updated 3 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- ☆28Updated 10 years ago
- Control Flow Guard Teleportation demo☆23Updated 5 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- Automated library compilation and PDB annotation with CMake and IDA Pro☆22Updated 6 years ago
- ida python scripts☆23Updated 6 years ago
- Analysis PE file or Shellcode☆49Updated 8 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆41Updated 5 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- ☆52Updated 6 years ago
- Allows IDA PRO to disassemble x86-64 code (WOW64) in 32-bit database☆25Updated 3 years ago
- ☆32Updated last year
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- Plugins for IDA Pro and Hex-Rays☆42Updated 7 years ago
- ☆39Updated 4 years ago
- ☆34Updated 3 years ago
- ☆17Updated 4 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆91Updated 6 years ago
- ☆22Updated 4 years ago
- Public repository for HEVD exploits☆20Updated 6 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆53Updated 5 years ago
- ☆35Updated 9 years ago
- Yet another rule generator for Yara☆29Updated 2 weeks ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆43Updated 6 years ago
- ☆23Updated 6 years ago