endgameinc / Py2ExeDecompiler
☆165Updated 7 years ago
Alternatives and similar repositories for Py2ExeDecompiler:
Users that are interested in Py2ExeDecompiler are comparing it to the libraries listed below
- Miscellaneous tools written in Python, mostly centered around shellcodes.☆145Updated 9 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆314Updated 6 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆98Updated 7 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆169Updated 6 years ago
- PyAna - Analyzing the Windows shellcode☆247Updated 9 years ago
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆98Updated 5 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- A Generic Windows Memory Scraping Tool☆70Updated 7 years ago
- zer0m0n driver for cuckoo sandbox☆87Updated 8 years ago
- Your bag of handy codes for malware researchers☆121Updated 4 years ago
- Allows you to quickly query a Windows machine for RAM artifacts☆219Updated 4 years ago
- some pocs for antivirus evasion☆129Updated last year
- Ruxcon2016 POC Code☆137Updated 8 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆105Updated 4 years ago
- Runtime Process Manipulation☆231Updated 2 months ago
- A tool to detect and crash Cuckoo Sandbox☆290Updated 6 months ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆114Updated 4 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 7 years ago
- ☆134Updated 6 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆194Updated 7 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆115Updated 8 years ago
- ☆102Updated 5 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆161Updated 8 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- Automated malware unpacker☆120Updated 8 years ago
- A collection of tools for dealing with TrickBot☆198Updated 7 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆213Updated 4 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆151Updated 3 years ago
- Frida.re based RunPE (and MapViewOfSection) extraction tool☆111Updated 7 years ago