Static file analysis for PE files
☆13Dec 4, 2020Updated 5 years ago
Alternatives and similar repositories for pe-static
Users that are interested in pe-static are comparing it to the libraries listed below
Sorting:
- ExeScan is the FREE console based tool to detect anomalies in PE (Portable Executable) files. It quickly scans given executable file and …☆21Dec 14, 2018Updated 7 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- 这是一个 fps 单机游戏逆向练习项目,使用 imgui 绘制。(This is a reverse practice project for fps single player games, drawn using imgui.)☆13Sep 5, 2023Updated 2 years ago
- Powershell Network Scanner☆38Jan 20, 2020Updated 6 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Automatically set traffic rules for Dynamic IP Addresses from a Dynamic DNS Domain☆12May 31, 2022Updated 3 years ago
- log4j2 rce漏洞扫描器☆11Mar 2, 2024Updated 2 years ago
- Anti-Debugging detection and obufuscation techniques that involved the use of Win32 API functions.☆34Apr 4, 2016Updated 9 years ago
- load macho files in memory without touching the Disk☆43Sep 16, 2022Updated 3 years ago
- Fetch PDB symbols directly from Microsoft's symbol servers☆48Oct 22, 2025Updated 4 months ago
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆40Jun 16, 2024Updated last year
- A python script file to forensically examine Microsoft Windows memory-dump files - It can pull usernames, password hashes, extract .pcap …☆10Apr 23, 2021Updated 4 years ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- AutoIt Obfuscator (Python module) lets you protect AutoIt script source code against analysis, reverse engineering, and decompilation usi…☆12Nov 27, 2025Updated 3 months ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- PowerShell tools for managing a Hyper-V guarded fabric and shielded virtual machines☆18Sep 20, 2019Updated 6 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 4 years ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆18Jan 15, 2022Updated 4 years ago
- Simple single file header for creating zero imports drivers. Can be useful for bypassing forensic memory analysis performed by anticheats…☆16Jun 10, 2025Updated 8 months ago
- A FRONTEND Interfaces compliant device for the USRP that requires the UHD host code and supporting libraries to be installed☆16Sep 7, 2018Updated 7 years ago
- Python framework for collecting and analyzing TLS certificate data via the Certificate Transparency Network☆12May 25, 2025Updated 9 months ago
- Collection of mods for Total War: Warhammer III☆13Aug 25, 2022Updated 3 years ago
- Sample usage of the libdxg projects.☆14Jan 29, 2026Updated last month
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated last week
- handle elevation using bedaisy.☆13Aug 17, 2020Updated 5 years ago
- Qubes component: core-qubesdb☆12Feb 20, 2026Updated 2 weeks ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 4 years ago
- An agent that performs user actions on a workstation☆12Jan 22, 2018Updated 8 years ago
- GDI Render in kernelmode☆10Mar 7, 2020Updated 5 years ago
- Aruba Instant (IAP) - Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- ☆11Mar 19, 2019Updated 6 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 14 years ago
- Node module to easily lookup city and state for a US zipcode☆14Dec 28, 2013Updated 12 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 8 years ago
- ☆14Nov 12, 2021Updated 4 years ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago