chesvectain / PackingDataLinks
☆14Updated 5 years ago
Alternatives and similar repositories for PackingData
Users that are interested in PackingData are comparing it to the libraries listed below
Sorting:
- Dataset of packed PE samples☆35Updated last year
- A malware dataset curation tool which helps identify packed samples.☆32Updated 6 years ago
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆47Updated 7 months ago
- ☆15Updated last year
- Parse .NET executable files.☆76Updated this week
- Robust Automated Malware Unpacker☆84Updated 2 years ago
- ☆28Updated 5 years ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆73Updated last year
- ☆71Updated last year
- Native Python3 bindings for @horsicq's Detect-It-Easy☆72Updated 2 months ago
- Dataset of packed ELF samples☆19Updated 2 years ago
- Utilities for working with vivisect☆25Updated 4 months ago
- Yet another rule generator for Yara☆29Updated last month
- A set of small utilities, helpers for PIN tracers☆32Updated last year
- Capa analysis importer for Ghidra.☆61Updated 4 years ago
- This repository contains D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation.☆35Updated 4 years ago
- Scripts to aid analysis of files obfuscated with ScatterBee.☆22Updated 2 years ago
- A modular Karton Framework service that unpacks common packers like UPX and others using the Qiling Framework.☆58Updated 4 years ago
- Metadata hash incorporating the Rich Header for robustness against packing and other malware tricks☆65Updated 3 years ago
- Rekall Memory Forensic Framework☆32Updated 5 years ago
- A python script that can be used to scan data within in an IDB using Yara.☆23Updated 6 years ago
- Parsing of YARA rules into AST and building new rulesets in C++.☆124Updated 2 weeks ago
- Tools for inspecting YARA bytecode☆17Updated 5 years ago
- ☆59Updated 4 years ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆45Updated 3 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Updated 5 years ago
- Ghidra plugin for https://analyze.intezer.com☆71Updated 2 years ago
- Binary Reverse Engineering Data Science Kit☆83Updated 4 years ago
- An attempt to detect malware using Opcodes and Hexadecimal Instructions.☆32Updated 3 years ago
- DRAKVUF Black-box Binary Analysis☆15Updated last month