angea / corkami
Automatically exported from code.google.com/p/corkami
☆53Updated 3 years ago
Related projects: ⓘ
- Learn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.☆74Updated 3 years ago
- Set of antianalysis techniques found in malware☆124Updated last year
- Parsers for custom malware formats ("Funky malware formats")☆92Updated 2 years ago
- My repository to upload drivers from different books and all the information related to windows internals.☆153Updated 5 years ago
- Scripts I made to aid me in everyday reversing or just for fun...☆35Updated 5 years ago
- ☆43Updated 2 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆41Updated 8 months ago
- Automatically rebuild Import Address Table for dumped PE file. With python bindings!☆115Updated 5 years ago
- ☆104Updated 5 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆73Updated 9 years ago
- Driver Initial Reconnaissance Tool☆119Updated 4 years ago
- Official x64dbg plugin for Binary Ninja☆69Updated this week
- An application to view and filter pool allocations from a dmp file on Windows 10 RS5+.☆121Updated last year
- An IDA Pro extension for easier (malware) reverse engineering☆109Updated 2 years ago
- SentinelOne's KeRnel Exploits Advanced Mitigations☆50Updated 5 years ago
- Notes on using the Python bindings for the Unicorn Engine☆66Updated 4 years ago
- ☆107Updated 4 years ago
- Enumerate user mode shared memory mappings on Windows.☆112Updated 3 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆117Updated 4 years ago
- POC viruses I have created to demo some ideas☆58Updated 4 years ago
- ☆60Updated 5 years ago
- BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)☆120Updated 2 years ago
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆72Updated 3 years ago
- Analyses in IDA/Hex-Rays☆78Updated last year
- Windows Drivers☆95Updated 5 years ago
- my results for the exercises in the book "Practical Reverse Engineering" by Bruce Dang et al.☆107Updated 10 years ago
- ☆112Updated 8 years ago
- Static unpacker for FinSpy VM☆97Updated 3 years ago
- FindCrypt for Ghidra written in Python☆25Updated 4 years ago
- ☆66Updated last year