[F]aster [U]niversal [U]npacker
☆60Jul 27, 2013Updated 12 years ago
Alternatives and similar repositories for fuu
Users that are interested in fuu are comparing it to the libraries listed below
Sorting:
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Game Hacking Adventures Scripts & Tools☆20Dec 29, 2012Updated 13 years ago
- My collection of unpackers for malware packers/crypters☆28Aug 24, 2017Updated 8 years ago
- This tool is a plugin based version checker for .NET obfuscators.☆12Jun 13, 2016Updated 9 years ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 12 years ago
- Private set of tools for game hacking☆12Jan 25, 2015Updated 11 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- ☆15Feb 22, 2021Updated 5 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Hacking Games in a Hacked Game☆29Apr 20, 2015Updated 10 years ago
- A dark x64dbg color theme based on IDA Consonance☆19Apr 5, 2018Updated 7 years ago
- Perform WiFi scans from python in OSX. Simply import this module and run wifi_scan()☆18Feb 27, 2016Updated 10 years ago
- Maintaining an official release at http://split-code.com/cda.html . Tool for recording, filtering, and hacking function calls within appl…☆68Nov 3, 2014Updated 11 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- ☆11Aug 28, 2024Updated last year
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Debian10-Linux4.19 Hook sys_call_table By IDT☆11May 9, 2020Updated 5 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- Bypass Antivm and Cuckoo Sandbox Techniques☆12Oct 12, 2016Updated 9 years ago
- Pintool to detect Read before Write memory access☆21Mar 20, 2013Updated 12 years ago
- Easy sandboxing for rust☆11Jun 19, 2016Updated 9 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Example plug-ins for GammaRay☆15Jun 4, 2018Updated 7 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Corpus of crypto formats☆12Dec 2, 2022Updated 3 years ago
- PE rebuilder, based on yoda's realigndll☆12Oct 1, 2011Updated 14 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- p0f Python Wrapper☆17Sep 29, 2013Updated 12 years ago
- c++ code snippets for winapi which can be very useful when coming up with a user interface (gui)☆11Mar 1, 2020Updated 6 years ago
- ☆42May 10, 2016Updated 9 years ago
- Library for Dissect and Infect ELF Binaries.☆40Apr 27, 2025Updated 10 months ago
- a collection of public yara rules☆25Oct 30, 2019Updated 6 years ago
- ☆10Mar 30, 2016Updated 9 years ago