bootkitsbook / bootkitsLinks
☆66Updated 6 years ago
Alternatives and similar repositories for bootkits
Users that are interested in bootkits are comparing it to the libraries listed below
Sorting:
- ☆106Updated 6 years ago
- ☆34Updated 4 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Updated 5 years ago
- Parsers for custom malware formats ("Funky malware formats")☆96Updated 3 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- Flare-On solutions☆36Updated 5 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆123Updated 4 years ago
- SentinelOne's KeRnel Exploits Advanced Mitigations☆54Updated 6 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆92Updated 6 years ago
- ☆71Updated last year
- ☆13Updated 6 years ago
- Capa analysis importer for Ghidra.☆62Updated 4 years ago
- Rekall Memory Forensic Framework☆32Updated 6 years ago
- ☆21Updated 3 months ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆74Updated 6 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Ghidra plugin for https://analyze.intezer.com☆71Updated 2 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆43Updated 6 years ago
- BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)☆125Updated 3 years ago
- Learn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.☆81Updated 4 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated last year
- ☆52Updated 6 years ago
- Automatically rebuild Import Address Table for dumped PE file. With python bindings!☆120Updated 6 years ago
- Driver Initial Reconnaissance Tool☆123Updated 5 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆75Updated last year
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- ☆23Updated 6 years ago
- WinDbg workplace settings that I use for debugging☆16Updated 8 years ago
- Enumerate Windows Defender threat families and dump their names according category☆90Updated 6 years ago