angea / corkamiLinks
Automatically exported from code.google.com/p/corkami
☆57Updated 4 years ago
Alternatives and similar repositories for corkami
Users that are interested in corkami are comparing it to the libraries listed below
Sorting:
- Learn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.☆81Updated 4 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated last year
- Set of antianalysis techniques found in malware☆131Updated last year
- SentinelOne's KeRnel Exploits Advanced Mitigations☆54Updated 6 years ago
- ☆72Updated 11 years ago
- Full DLL Hooking, phrack 65☆53Updated 2 years ago
- My repository to upload drivers from different books and all the information related to windows internals.☆157Updated 5 years ago
- An IDA Pro extension for easier (malware) reverse engineering☆115Updated 3 years ago
- Static unpacker for FinSpy VM☆102Updated 4 years ago
- Official x64dbg plugin for Binary Ninja☆80Updated 4 months ago
- ☆106Updated 6 years ago
- Polymorphic VM and PoliCTF '17 reversing challenge.☆73Updated 10 months ago
- Scripts I made to aid me in everyday reversing or just for fun...☆35Updated 6 years ago
- ☆66Updated 6 years ago
- Parsers for custom malware formats ("Funky malware formats")☆96Updated 3 years ago
- Driver Initial Reconnaissance Tool☆123Updated 5 years ago
- This is a place to share my miscellaneous projects.☆114Updated 5 years ago
- The history of Windows Internals via symbols.☆180Updated 3 years ago
- ☆71Updated last year
- Extract labels from IDA, Ghidra, Binary Ninja, and Relyze files and export x64dbg database. Including radare2 main address.☆112Updated last year
- A novel technique to hide code from debuggers & disassemblers☆156Updated last year
- Hypervisor-based debugger☆189Updated 4 years ago
- my results for the exercises in the book "Practical Reverse Engineering" by Bruce Dang et al.☆111Updated 11 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Notes on using the Python bindings for the Unicorn Engine☆78Updated 5 years ago
- An Integrity-Check Monitoring Pintool☆58Updated 4 years ago
- Enumerate user mode shared memory mappings on Windows.☆122Updated 4 years ago
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆184Updated 4 years ago
- An analysis of the Warbird virtual-machine protection for the CI!g_pStore☆252Updated 7 years ago
- Sample project for kernel debugging automation with Vagrant☆61Updated 5 years ago