Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code
☆51May 3, 2016Updated 9 years ago
Alternatives and similar repositories for unpacking
Users that are interested in unpacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 10 years ago
- Certified Edible Dinosaurs official CTF toolkit☆119Apr 2, 2018Updated 7 years ago
- Collection of pin tools☆52Dec 29, 2015Updated 10 years ago
- NSIS Reversing Suite with IDA Plugins☆113May 15, 2023Updated 2 years ago
- Imports Reconstructor☆31Mar 17, 2016Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Ida Pro Ultimate Qt Build Guide☆27Dec 13, 2018Updated 7 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 10 years ago
- IDAPython plugin for finding function strings recursively☆133May 17, 2022Updated 3 years ago
- IDATACO IDA Pro Plugin☆46Jun 14, 2016Updated 9 years ago
- capstone based disassembler for extracting to binnavi☆230Jun 8, 2016Updated 9 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 10 years ago
- PyAna - Analyzing the Windows shellcode☆247Feb 16, 2016Updated 10 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- easy detour-, vftable-, iat- and eathooking☆12Mar 30, 2016Updated 9 years ago
- ☆12Oct 29, 2015Updated 10 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- ☆11Sep 14, 2014Updated 11 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆149Oct 5, 2017Updated 8 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Sep 15, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Codemap☆127Jan 13, 2017Updated 9 years ago
- ATrace is a tool for tracing execution of binaries on Windows.☆241Nov 19, 2025Updated 4 months ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- map file generator for intel x86 binary based on flirt signature☆83May 2, 2016Updated 9 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Mar 13, 2017Updated 9 years ago
- ☆10Jul 30, 2017Updated 8 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 9 years ago
- ☆30May 23, 2017Updated 8 years ago
- ☆22Sep 27, 2017Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Apr 20, 2015Updated 10 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- An amd64 symbolic emulator☆314Aug 28, 2021Updated 4 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- a collection of public yara rules☆25Oct 30, 2019Updated 6 years ago