ayoubfaouzi / binary-auditing-solutionsLinks
Learn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.
☆81Updated 4 years ago
Alternatives and similar repositories for binary-auditing-solutions
Users that are interested in binary-auditing-solutions are comparing it to the libraries listed below
Sorting:
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆75Updated 11 months ago
- Static unpacker for FinSpy VM☆101Updated 3 years ago
- A fast execution trace symbolizer for Windows.☆131Updated last year
- Parsers for custom malware formats ("Funky malware formats")☆96Updated 3 years ago
- IDA Pro resources, scripts, and configurations☆113Updated last week
- Polymorphic VM and PoliCTF '17 reversing challenge.☆73Updated 9 months ago
- Toy scripts for playing with WinDbg JS API☆232Updated 11 months ago
- My repository to upload drivers from different books and all the information related to windows internals.☆156Updated 5 years ago
- PEDA-like debugger UI for WinDbg☆204Updated last year
- ☆72Updated 3 years ago
- kernel pool windbg extension☆84Updated 9 years ago
- Analyses in IDA/Hex-Rays☆83Updated 2 years ago
- This is a place to share my miscellaneous projects.☆114Updated 5 years ago
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆183Updated 4 years ago
- An IDA Pro extension for easier (malware) reverse engineering☆115Updated 2 years ago
- Ablation is a tool for augmenting static analysis by extracting information at runtime, and importing it into IDA. It can resolve virtual…☆50Updated 8 years ago
- Simple library to spray the Windows Kernel Pool☆109Updated 5 years ago
- Driver Initial Reconnaissance Tool☆123Updated 5 years ago
- A simple API monitor for Windbg☆63Updated 8 years ago
- IDA Plugin which decodes Windows Device I/O control code into DeviceType, FunctionCode, AccessType and MethodType.☆111Updated last year
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- IDA plugin to explore and browse tags☆56Updated 5 years ago
- A branch-monitor-based solution for process monitoring.☆133Updated 5 years ago
- Toolkit for Hyper-V security research☆157Updated 3 years ago
- ☆85Updated last year
- Write-ups for crackmes and CTF challenges☆51Updated 2 years ago
- SentinelOne's KeRnel Exploits Advanced Mitigations☆54Updated 6 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆125Updated last year
- ☆227Updated 2 years ago
- Port of the binary diffing library, diaphora, for radare2 and mariadb☆51Updated last year