bxlcity / malwareLinks
☆38Updated 8 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below
Sorting:
- ☆28Updated 8 years ago
- User-mode part of Zerokit platform☆22Updated 6 years ago
- A simple native code virtualizer for 32-bit Windows PE☆15Updated 10 years ago
- A quick String < - > HEX tool for Windows with Drag & Drop and File saving☆10Updated 7 years ago
- ☆27Updated 10 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Updated 14 years ago
- hook detector using emulation and comparing static with dynamic outputs☆17Updated 2 years ago
- A loadable dll that tracks memory changes, IAT hooks, and dynamically emplaced "JMP" in the x86 host executable.☆12Updated 2 years ago
- OllyCallTrace is a plugin for OllyDbg to trace the call chain of a thread.☆54Updated 14 years ago
- IDA loader module for Hidden Bee's custom executable file format☆20Updated 7 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆37Updated 12 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- windows kernel File redirection☆20Updated 11 years ago
- Windows anti-rootkit library☆37Updated 10 years ago
- Updated version of ApiTracer Pin tool☆23Updated 7 years ago
- Malware monitor template based on MinHook☆17Updated 10 years ago
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆33Updated 11 years ago
- Anti-AV compilation☆44Updated 12 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Updated 9 years ago
- ☆34Updated 7 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Updated 11 years ago
- C/C++ machine code obfuscation.☆65Updated 4 years ago
- A collection of tools for injecting DSOs in processes under various operating systems☆52Updated 3 years ago
- repository with additional materials and source code☆32Updated 9 years ago
- IDA Pro plug-in and tools for displaying 3D graphs of procedures using UbiGraph☆26Updated 12 years ago
- Kernel-mode file scanner☆19Updated 7 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 8 years ago
- IDA2PAT_Reloaded for windows and mac osx☆13Updated 8 years ago
- Analysis and Modification Tool for Executables☆17Updated 6 years ago
- Miscellaneous old Exploit code and PoCs☆16Updated last year