d3sre / Understanding_the_NDIS_6_stack
Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"
☆41Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for Understanding_the_NDIS_6_stack
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- Test suite for bypassing Malware sandboxes.☆38Updated 10 years ago
- POC for IAT Parsing Payloads☆47Updated 7 years ago
- a collection of yara rules for binary analysis☆24Updated 7 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆35Updated 8 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆34Updated 7 years ago
- ☆32Updated 7 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆36Updated 7 years ago
- zer0m0n driver for cuckoo sandbox☆21Updated 9 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 8 years ago
- Analysis PE file or Shellcode☆48Updated 8 years ago
- swffile.py - SWF file parser module in Python☆28Updated 8 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆14Updated 7 years ago
- ☆32Updated 5 months ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆19Updated 9 years ago
- Malware analyses and helpful scripts☆29Updated 2 years ago
- Command-line Interface for Binar.ly☆37Updated 7 years ago
- Tool for dropping malware from EK☆41Updated 6 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 8 years ago
- ☆41Updated 6 years ago
- Volatility Plugins☆21Updated 9 years ago
- Server for receiving autorun data from the clients☆13Updated 7 years ago
- Volatility Plugin to scan for shimmed processes in Windows☆10Updated 9 years ago
- A tool to generate yara signatures from function blocks☆19Updated 9 years ago
- Memory forensics of virtualization environments☆45Updated 10 years ago