enkomio / thematrixLinks
a PE Loader and Windows API tracer. Useful in malware analysis.
☆143Updated 2 years ago
Alternatives and similar repositories for thematrix
Users that are interested in thematrix are comparing it to the libraries listed below
Sorting:
- MalUnpack companion driver☆98Updated last year
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆116Updated 2 years ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆124Updated 5 months ago
- ☆71Updated 2 years ago
- Small visualizator for PE files☆69Updated last year
- ☆146Updated 2 years ago
- Binary Ninja plugin for exploring Structured Exception Handlers☆81Updated last year
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆92Updated 3 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆117Updated last year
- Abusing exceptions for code execution.☆111Updated 2 years ago
- Winbindex bot to pull in binaries for specific releases☆48Updated last year
- C# implementation to produce ROR-13 numeric hash for given function API name☆33Updated 6 years ago
- ☆162Updated 3 years ago
- Detours implementation (x64/x86) which used only ntdll import☆90Updated last year
- A command line Windows API tracing tool for Golang binaries.☆156Updated last year
- Windows kernel PDB data parsed into YAML☆38Updated 8 months ago
- ☆96Updated 3 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆75Updated 3 years ago
- Simple windows API logger☆108Updated 5 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆251Updated 2 years ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆35Updated 4 years ago
- Small tool to convert beteween the PE alignments (raw and virtual).☆93Updated 2 years ago
- Set of antianalysis techniques found in malware☆132Updated last year
- Parse .NET executable files.☆76Updated 3 weeks ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆106Updated 2 years ago
- ☆114Updated 2 years ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆72Updated last year
- Enumerate various traits from Windows processes as an aid to threat hunting☆187Updated 3 years ago
- A post-processing script for TinyTracer☆37Updated 2 years ago
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆97Updated 5 years ago