doomedraven / ToolsLinks
Combination of different utilities, have fun!
☆222Updated last year
Alternatives and similar repositories for Tools
Users that are interested in Tools are comparing it to the libraries listed below
Sorting:
- InviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date…☆579Updated 3 years ago
- capemon: CAPE's monitor☆145Updated last week
- ShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solution…☆219Updated 3 years ago
- Malduck is your ducky companion in malware analysis journeys☆349Updated 7 months ago
- Extract AutoIt scripts embedded in PE binaries☆216Updated last year
- zer0m0n driver for cuckoo sandbox☆368Updated 10 years ago
- A Binary Genetic Traits Lexer Framework☆520Updated 5 months ago
- This project aims at simplifying Windows API import recovery on arbitrary memory dumps☆261Updated 2 years ago
- Live hunting of code injection techniques☆385Updated 6 years ago
- Dynamic unpacker based on PE-sieve☆795Updated 4 months ago
- Generating YARA rules based on binary code☆218Updated 4 years ago
- Source from VMDE paper, adapted to 2015☆189Updated 8 years ago
- Virtual Machine Introspection, Tracing & Debugging☆595Updated 3 years ago
- HashDB API hash lookup plugin for IDA Pro☆347Updated 3 months ago
- Automatic YARA rule generation for Malpedia☆165Updated 3 years ago
- Debug Child Process Tool (auto attach)☆319Updated 2 years ago
- IDA python plugin to scan binary with Yara rules☆180Updated 2 years ago
- Yara rule making tool (IDA Pro & Binary Ninja & Cutter & Ghidra Plugin)☆242Updated last year
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆671Updated 3 weeks ago
- Script to create templates to use with VirtualBox to make vm detection harder☆769Updated 3 years ago
- BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)☆128Updated 4 years ago
- Automatically generate AV byte signatures from sets of similar binaries.☆285Updated last year
- Python scripts for Malware Bazaar☆157Updated last year
- ☆113Updated 4 months ago
- Various Yara signatures (possibly to be included in a release later).☆87Updated 6 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆184Updated 3 months ago
- Assortment of hashing algorithms used in malware☆389Updated 2 weeks ago
- Binee: binary emulation environment☆530Updated 2 years ago
- ☆128Updated 11 months ago
- List of tools to assist in analyzing samples of ISFB/Gozi/Ursnif☆15Updated 6 years ago