dalvarezperez / umseLinks
Universal Malware Sample Encryption
☆12Updated last year
Alternatives and similar repositories for umse
Users that are interested in umse are comparing it to the libraries listed below
Sorting:
- ☆23Updated 4 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆124Updated 5 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 8 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆56Updated 4 months ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 7 years ago
- Rekall Memory Forensic Framework☆33Updated 6 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Updated 3 years ago
- My collection of unpackers for malware packers/crypters☆28Updated 8 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Flare-On solutions☆37Updated 6 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 4 years ago
- Ghidra plugin for https://analyze.intezer.com☆72Updated 3 years ago
- ☆90Updated 5 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Updated 6 years ago
- ☆28Updated 5 years ago
- ☆73Updated 2 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆47Updated 5 years ago
- ☆36Updated 6 years ago
- Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.☆14Updated 5 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆55Updated 7 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Updated 7 years ago
- Extract annoations from Ghidra into an X32/X64 dbg database☆57Updated 4 years ago
- CAPE monitor DLLs☆41Updated 6 years ago
- ☆18Updated 5 years ago
- A collection of anti disassembly techniques☆19Updated 8 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆93Updated 7 years ago