benoitsevens / applying-ttd-to-malware-analysis
Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019
☆40Updated 5 years ago
Alternatives and similar repositories for applying-ttd-to-malware-analysis:
Users that are interested in applying-ttd-to-malware-analysis are comparing it to the libraries listed below
- IDARay is an IDA Pro plugin that matches the database against multiple YARA files which themselves may contain multiple rules.☆18Updated 6 years ago
- Flare-On solutions☆36Updated 5 years ago
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 5 years ago
- ☆33Updated 3 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- IDA script for vmprotect Windows Api address decoder☆51Updated 3 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- ☆23Updated 5 years ago
- ☆28Updated 4 years ago
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆53Updated 2 years ago
- ☆71Updated last year
- Parsers for custom malware formats ("Funky malware formats")☆96Updated 3 years ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆73Updated 5 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆75Updated 9 months ago
- Public repository for HEVD exploits☆20Updated 6 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆29Updated 8 years ago
- ☆19Updated last week
- Analyses in IDA/Hex-Rays☆81Updated 2 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Updated 6 years ago
- A collection of empty MSVC projects, compiled using various versions and configurations of Visual Studio.☆32Updated 10 months ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆58Updated 8 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆43Updated last year
- Yet another rule generator for Yara☆28Updated 4 years ago
- IDA plugin to explore and browse tags☆54Updated 5 years ago
- Use WinDBG to trace the Windows API calls of any Portable Executable file☆31Updated 8 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆41Updated 5 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆77Updated 9 years ago
- A modular Karton Framework service that unpacks common packers like UPX and others using the Qiling Framework.☆56Updated 3 years ago
- Rekall Memory Forensic Framework☆32Updated 5 years ago