Identifies metadata of .NET binary files.
☆21Apr 3, 2024Updated 2 years ago
Alternatives and similar repositories for DotNet-MetaData
Users that are interested in DotNet-MetaData are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆25Aug 21, 2023Updated 2 years ago
- Tools for Incident Response and Malware Analysis☆11Feb 9, 2025Updated last year
- Repository that contains a set of purposefully erroneous Yara rules.☆61Jul 23, 2025Updated 8 months ago
- Example of an ELF parser to learn about the ELF format☆11Oct 6, 2024Updated last year
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated 2 years ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆18Jun 29, 2024Updated last year
- Quick ESXi Log Parser☆30Oct 20, 2025Updated 5 months ago
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Feb 13, 2023Updated 3 years ago
- function identification signatures☆12Apr 26, 2021Updated 4 years ago
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year
- ILANDS Sensor traffic data analysis software packages☆10Mar 27, 2026Updated last week
- The future home for a library able to parse in memory lot of complex structures from common shared libs and syscalls☆15Apr 4, 2023Updated 3 years ago
- Compiled executables of common crypto and encoding algorithms☆16Oct 3, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Ghosting-AMSI☆18Apr 30, 2025Updated 11 months ago
- version 0.5.8☆18Jul 13, 2021Updated 4 years ago
- Sliver agents for Mythic☆48Nov 18, 2024Updated last year
- YARI is an interactive debugger for YARA Language.☆90Sep 10, 2025Updated 6 months ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- YARA Language Server☆74Feb 3, 2026Updated 2 months ago
- ☆22Dec 22, 2020Updated 5 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Feb 23, 2017Updated 9 years ago
- the Open Source and Pure C++ Packer for eXecutables☆21Mar 25, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Jul 9, 2023Updated 2 years ago
- Set of plugins and library for dynamic pdb generation and synchronisation☆39May 3, 2024Updated last year
- ☆25Jan 8, 2024Updated 2 years ago
- A Code highlighting plugin for OllyDbg 2.01.☆17Dec 10, 2014Updated 11 years ago
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- ☆84May 19, 2024Updated last year
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Mar 27, 2025Updated last year
- Unpacker for donut shellcode☆21Jun 20, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- A wrapper library for the set of ptrace-related system calls in Linux☆13May 20, 2014Updated 11 years ago
- ☆64Mar 29, 2022Updated 4 years ago
- Proof of concept agentic solver for nfuncs from DEF CON Quals 2025☆23Apr 18, 2025Updated 11 months ago
- A collection of my reverse engineering and malware analysis write-ups☆21Dec 11, 2020Updated 5 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆18May 19, 2024Updated last year
- Hex-Rays CLI (HCLI)☆70Updated this week