enkomio / SojoboLinks
A binary analysis framework
☆133Updated 4 years ago
Alternatives and similar repositories for Sojobo
Users that are interested in Sojobo are comparing it to the libraries listed below
Sorting:
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆92Updated 6 years ago
- Ghidra scripts such as a RC4 decrypter, Yara search, stack string decoder, etc.☆160Updated 5 years ago
- IDA plugin for reverse-engineering and dynamic interactions with the Binsec platform☆117Updated 8 years ago
- pyGoRE - Python library for analyzing Go binaries☆66Updated 3 years ago
- Flare-On solutions☆37Updated 6 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- Write-ups for crackmes and CTF challenges☆53Updated 3 years ago
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆184Updated 5 years ago
- ☆135Updated 5 years ago
- A set of scripts for a radare-based malware code analysis workflow☆68Updated 6 years ago
- Sacara VM☆123Updated 5 years ago
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆86Updated 3 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆124Updated 5 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Updated 3 years ago
- An IDA Pro extension for easier (malware) reverse engineering☆115Updated 3 years ago
- IDA Pro resources, scripts, and configurations☆119Updated last month
- ☆53Updated 7 years ago
- ☆91Updated 6 years ago
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆78Updated 11 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated last year
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 6 years ago
- Ghidra plugin for https://analyze.intezer.com☆72Updated 3 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆111Updated 6 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Updated 7 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- A novel technique to hide code from debuggers & disassemblers☆159Updated last year
- Hansel - a simple but flexible search for IDA☆26Updated 6 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- Use this library to automatically extract PE files compressed with aplib from a binary blob.☆34Updated 6 years ago