ayoubfaouzi / binary-auditing-solutions
Learn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.
☆78Updated 4 years ago
Alternatives and similar repositories for binary-auditing-solutions:
Users that are interested in binary-auditing-solutions are comparing it to the libraries listed below
- Static unpacker for FinSpy VM☆99Updated 3 years ago
- IDA Pro resources, scripts, and configurations☆111Updated 11 months ago
- Polymorphic VM and PoliCTF '17 reversing challenge.☆72Updated 5 months ago
- A fast execution trace symbolizer for Windows.☆130Updated 9 months ago
- Ablation is a tool for augmenting static analysis by extracting information at runtime, and importing it into IDA. It can resolve virtual…☆48Updated 8 years ago
- Parsers for custom malware formats ("Funky malware formats")☆93Updated 3 years ago
- PEDA-like debugger UI for WinDbg☆202Updated 10 months ago
- A branch-monitor-based solution for process monitoring.☆131Updated 5 years ago
- IDA plugin to explore and browse tags☆53Updated 5 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆89Updated 5 years ago
- Analyses in IDA/Hex-Rays☆80Updated last year
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆75Updated 7 months ago
- ☆176Updated 6 years ago
- Robust Automated Malware Unpacker☆84Updated last year
- ☆72Updated 3 years ago
- My repository to upload drivers from different books and all the information related to windows internals.☆153Updated 5 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆119Updated 4 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆39Updated 5 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆121Updated 11 months ago
- A DBI tool to discover heap memory related bugs☆125Updated 6 years ago
- Blackhat 2012 Sample Codes☆93Updated 8 years ago
- Multi-tool reverse engineering collaboration solution.☆138Updated 10 months ago
- kernel pool windbg extension☆80Updated 9 years ago
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆181Updated 4 years ago
- IDA Plugin which decodes Windows Device I/O control code into DeviceType, FunctionCode, AccessType and MethodType.☆107Updated last year
- ☆99Updated 8 months ago
- A project that aims to automatically devirtualize code that has been virtualized using x86virt☆126Updated 2 years ago
- BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)☆123Updated 3 years ago
- Write-ups for crackmes and CTF challenges☆51Updated 2 years ago