ayoubfaouzi / binary-auditing-solutions
Learn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.
☆79Updated 4 years ago
Alternatives and similar repositories for binary-auditing-solutions:
Users that are interested in binary-auditing-solutions are comparing it to the libraries listed below
- Polymorphic VM and PoliCTF '17 reversing challenge.☆73Updated 6 months ago
- Parsers for custom malware formats ("Funky malware formats")☆95Updated 3 years ago
- A fast execution trace symbolizer for Windows.☆130Updated 10 months ago
- My repository to upload drivers from different books and all the information related to windows internals.☆156Updated 5 years ago
- Static unpacker for FinSpy VM☆100Updated 3 years ago
- PEDA-like debugger UI for WinDbg☆203Updated 11 months ago
- IDA Pro resources, scripts, and configurations☆111Updated last year
- Windows Kernel Programming☆124Updated 4 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆76Updated 8 months ago
- An IDA Pro extension for easier (malware) reverse engineering☆111Updated 2 years ago
- kernel pool windbg extension☆80Updated 9 years ago
- Ablation is a tool for augmenting static analysis by extracting information at runtime, and importing it into IDA. It can resolve virtual…☆50Updated 8 years ago
- ☆72Updated 3 years ago
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆181Updated 4 years ago
- A simple API monitor for Windbg☆63Updated 7 years ago
- ☆108Updated 4 years ago
- Multi-tool reverse engineering collaboration solution.☆138Updated last year
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆120Updated 4 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- Python scripts for reverse engineering.☆182Updated 3 years ago
- Build your emulation environment as needed☆65Updated 3 years ago
- Notes on using the Python bindings for the Unicorn Engine☆75Updated 5 years ago
- Hyper-V Research is trendy now☆178Updated 10 months ago
- Write-ups for crackmes and CTF challenges☆51Updated 2 years ago
- SentinelOne's KeRnel Exploits Advanced Mitigations☆53Updated 6 years ago
- IDA python plugin to scan binary with Yara rules☆173Updated last year
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆84Updated 8 years ago
- Driver Initial Reconnaissance Tool☆122Updated 5 years ago
- Toy scripts for playing with WinDbg JS API☆225Updated 8 months ago
- Blackhat 2012 Sample Codes☆93Updated 8 years ago