cdong1012 / IDAPython-Malware-Scripts
☆68Updated last year
Alternatives and similar repositories for IDAPython-Malware-Scripts:
Users that are interested in IDAPython-Malware-Scripts are comparing it to the libraries listed below
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆43Updated last year
- ☆22Updated 8 months ago
- UnpacMe IDA Byte Search☆27Updated last year
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆115Updated 6 months ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆115Updated last year
- ☆25Updated 3 months ago
- Small visualizator for PE files☆67Updated last year
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- IDA Pro plugin to aid with the analysis of native IIS modules☆17Updated 5 months ago
- General malware analysis stuff☆36Updated 5 months ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆31Updated 5 years ago
- A small tool to unmap PE memory dumps.☆11Updated last year
- Scripts to aid analysis of files obfuscated with ScatterBee.☆18Updated 2 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆53Updated 2 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆24Updated 2 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆33Updated 3 weeks ago
- ☆25Updated 2 months ago
- A small utility to deal with malware embedded hashes.☆49Updated last year
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆99Updated last year
- Golang bindings for PE-sieve☆42Updated last year
- Writeups for CTF challenges☆30Updated last year
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆95Updated last year
- ☆49Updated 3 months ago
- Monitors ETW for security relevant syscalls maintaining the set called by each unique process☆70Updated last year
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆33Updated last year
- Bypass Malware Time Delays☆100Updated 2 years ago
- Unpacking and decryption tools for the Emotet malware☆46Updated 3 years ago
- Small tool to convert beteween the PE alignments (raw and virtual).☆83Updated 2 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 2 years ago