benoitsevens / applying-ttd-to-malware-analysisLinks
Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019
☆41Updated 5 years ago
Alternatives and similar repositories for applying-ttd-to-malware-analysis
Users that are interested in applying-ttd-to-malware-analysis are comparing it to the libraries listed below
Sorting:
- IDARay is an IDA Pro plugin that matches the database against multiple YARA files which themselves may contain multiple rules.☆18Updated 6 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- ☆28Updated 5 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- Flare-On solutions☆36Updated 5 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 5 years ago
- ☆23Updated 6 years ago
- ☆71Updated last year
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆75Updated 11 months ago
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆55Updated 2 years ago
- Helper idapython code for reversing kmdf drivers☆72Updated 2 years ago
- A collection of empty MSVC projects, compiled using various versions and configurations of Visual Studio.☆32Updated last year
- ☆20Updated last month
- IDA script for vmprotect Windows Api address decoder☆51Updated 4 years ago
- Yet another rule generator for Yara☆29Updated 2 weeks ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆123Updated 4 years ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆74Updated 6 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Updated 6 years ago
- Use WinDBG to trace the Windows API calls of any Portable Executable file☆31Updated 8 years ago
- ☆34Updated 3 years ago
- The Minimalistic x86/x64 API Hooking Library for Windows☆32Updated 7 years ago
- ☆72Updated 3 years ago
- Utilities for working with vivisect☆25Updated 3 months ago
- Tools for inspecting YARA bytecode☆17Updated 4 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated last year
- SPI flash read MitM attack PoC☆38Updated 3 years ago
- TA505 unpacker Python 2.7☆47Updated 5 years ago
- Parsers for custom malware formats ("Funky malware formats")☆96Updated 3 years ago
- Public repository for HEVD exploits☆20Updated 7 years ago