blacknbunny / peanalyzerView external linksLinks
Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit
☆100Apr 15, 2019Updated 6 years ago
Alternatives and similar repositories for peanalyzer
Users that are interested in peanalyzer are comparing it to the libraries listed below
Sorting:
- ARCH : ARM, ARM64, MIPS, PPC, X86☆86Apr 9, 2019Updated 6 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Oct 26, 2025Updated 3 months ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22May 31, 2017Updated 8 years ago
- code emulator base on unicorn engine☆51Apr 23, 2018Updated 7 years ago
- This is a VmProtect integrated debugger, that will essentially allow you to disasm and debug vmp partially virtualized functions at the v…☆47Oct 18, 2016Updated 9 years ago
- Green shellcode challenge tools☆22Apr 9, 2019Updated 6 years ago
- Malware detection using learning and information retrieval for Android☆74Aug 11, 2020Updated 5 years ago
- ☆82Dec 3, 2017Updated 8 years ago
- a binary x86win32 code obfuscator using virtual machine☆31Jan 8, 2017Updated 9 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Trying for all arch detour stuff now☆11Feb 10, 2017Updated 9 years ago
- Windows build files for the VMHunt Intel PIN Trace tool☆19Nov 26, 2018Updated 7 years ago
- Decompile an x86 exe, and read PE infos.☆19Sep 29, 2018Updated 7 years ago
- The exploit for Panda AV LPE☆37May 22, 2019Updated 6 years ago
- ☆28Apr 1, 2018Updated 7 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Aug 12, 2020Updated 5 years ago
- Post module for Metasploit to execute ELF in memory☆86Nov 23, 2018Updated 7 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- ☆10Sep 29, 2019Updated 6 years ago
- 🔵 Ethereum and BNB (BSC) Mev bot - Arbitrage☆359Nov 25, 2025Updated 2 months ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆65Nov 4, 2012Updated 13 years ago
- Kinject - kernel dll injector, currently available in x86 version, will be updated to x64 soon.☆32Apr 10, 2015Updated 10 years ago
- IDA plugin for reverse-engineering and dynamic interactions with the Binsec platform☆117Nov 19, 2017Updated 8 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- ☆12Feb 19, 2017Updated 8 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆212Mar 27, 2022Updated 3 years ago
- IDA python plugin to scan binary with Yara rules☆180Jan 30, 2024Updated 2 years ago
- A novel technique to hide code from debuggers & disassemblers☆161Aug 9, 2024Updated last year
- Windows 10 kernel and ntdll internal types, directly compatible with ida.☆53Oct 14, 2018Updated 7 years ago
- Extract labels from IDA, Ghidra, Binary Ninja, and Relyze files and export x64dbg database. Including radare2 main address.☆114Nov 14, 2023Updated 2 years ago
- H2HC 2017 Slides/Materials/Presentations☆48Feb 5, 2018Updated 8 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- ☆349Mar 19, 2021Updated 4 years ago
- An analytical debugger programmed in C++, using Qt.☆22May 20, 2012Updated 13 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- [Not work] Deobfuscate obfuscated binaries!☆11Dec 16, 2016Updated 9 years ago