bartblaze / DotNet-MetaDataLinks
Identifies metadata of .NET binary files.
☆21Updated last year
Alternatives and similar repositories for DotNet-MetaData
Users that are interested in DotNet-MetaData are comparing it to the libraries listed below
Sorting:
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- ☆17Updated 8 months ago
- Progress of learning kernel development☆14Updated 3 years ago
- ☆27Updated last year
- Ghosting-AMSI☆18Updated 8 months ago
- Golang bindings for PE-sieve☆42Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- ☆38Updated 2 years ago
- ☆30Updated 4 months ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- Unpacker for donut shellcode☆21Updated 5 years ago
- ☆18Updated last year
- x64 Windows package of the shellcode2exe tool☆14Updated 5 years ago
- ☆49Updated 2 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- ☆15Updated 2 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 3 years ago
- ☆12Updated 3 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆70Updated 3 years ago
- Help deobfuscate VBScript☆18Updated 3 years ago
- ☆24Updated 11 months ago
- Small visualizator for PE files☆70Updated 2 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆43Updated last year
- ☆37Updated 10 months ago
- Tricard - Malware Sandbox Fingerprinting☆23Updated 2 years ago
- Small tool to play with IOCs caused by Imageload events☆44Updated 2 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- ☆27Updated 2 years ago