bxlcity / malwareLinks
☆37Updated 8 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below
Sorting:
- find and kill injectedThreads from memory☆12Updated 9 years ago
- ☆27Updated 7 years ago
- IDA Pro plug-in and tools for displaying 3D graphs of procedures using UbiGraph☆26Updated 12 years ago
- User-mode part of Zerokit platform☆22Updated 6 years ago
- A C/C++ code obfuscator based on llvm/clang technology☆16Updated 10 years ago
- A quick String < - > HEX tool for Windows with Drag & Drop and File saving☆12Updated 6 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Updated 8 years ago
- ☆27Updated 9 years ago
- Simple tool for unpacking packed/protected malware executables.☆33Updated 13 years ago
- Kernel-mode file scanner☆18Updated 7 years ago
- Kernel Shellcode to add all privileges in token☆13Updated 8 years ago
- ☆11Updated 9 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 8 years ago
- IDA2PAT_Reloaded for windows and mac osx☆13Updated 7 years ago
- Analysis and Modification Tool for Executables☆17Updated 6 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- ASProtect reverse engineering & analysis WinDbg extension☆23Updated 4 years ago
- A simple native code virtualizer for 32-bit Windows PE☆15Updated 9 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- Malware monitor template based on MinHook☆16Updated 10 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆13Updated 9 years ago
- Demos presented on Hackerfest 2015☆14Updated 9 years ago
- OllyCallTrace is a plugin for OllyDbg to trace the call chain of a thread.☆53Updated 13 years ago
- ☆16Updated 9 years ago
- Updated version of ApiTracer Pin tool☆22Updated 7 years ago
- PE32 binary + W32 payload☆12Updated 7 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆28Updated 11 years ago
- My collection of unpackers for malware packers/crypters☆28Updated 7 years ago
- Guest to host VM escape exploit for Parallels Desktop☆28Updated 10 years ago
- windows kernel File redirection☆20Updated 10 years ago