enkomio / SojoboLinks
A binary analysis framework
☆133Updated 5 years ago
Alternatives and similar repositories for Sojobo
Users that are interested in Sojobo are comparing it to the libraries listed below
Sorting:
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆92Updated 6 years ago
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆184Updated 5 years ago
- Ghidra scripts such as a RC4 decrypter, Yara search, stack string decoder, etc.☆160Updated 5 years ago
- pyGoRE - Python library for analyzing Go binaries☆66Updated 3 years ago
- Ghidra plugin for https://analyze.intezer.com☆72Updated 3 years ago
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆86Updated 3 years ago
- An IDA Pro extension for easier (malware) reverse engineering☆116Updated 3 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Updated 3 years ago
- A set of scripts for a radare-based malware code analysis workflow☆68Updated 6 years ago
- ☆226Updated 2 years ago
- Flare-On solutions☆37Updated 6 years ago
- IDA plugins and scripts for analyzing register usage frame☆181Updated 2 years ago
- Sacara VM☆123Updated 6 years ago
- IDA Pro resources, scripts, and configurations☆119Updated last month
- Write-ups for crackmes and CTF challenges☆54Updated 3 years ago
- ☆53Updated 7 years ago
- IDA plugin for reverse-engineering and dynamic interactions with the Binsec platform☆117Updated 8 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- Frida.re based RunPE (and MapViewOfSection) extraction tool☆114Updated 8 years ago
- Malware dynamic instrumentation tool based on frida framework☆110Updated 5 years ago
- A novel technique to hide code from debuggers & disassemblers☆159Updated last year
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆124Updated 5 years ago
- Automatically rebuild Import Address Table for dumped PE file. With python bindings!☆121Updated 6 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆77Updated 11 years ago
- ☆135Updated 6 years ago
- Use this library to automatically extract PE files compressed with aplib from a binary blob.☆34Updated 6 years ago
- ☆73Updated 2 years ago
- Reverse Engineering tools, scripts, and general commentary☆59Updated 6 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆111Updated 6 years ago
- Windows API tracer for malware (oldname: unitracer)☆120Updated 8 years ago