erocarrera / reverse-engineering-scripts
Automatically exported from code.google.com/p/reverse-engineering-scripts
☆18Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for reverse-engineering-scripts
- Work files for my blog post "Code Caving in a PE file.☆16Updated 7 years ago
- Malware analyses and helpful scripts☆29Updated 2 years ago
- radare2 script to help on COM objects reverse engineering☆11Updated 7 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- Malware.lu configuration extractor☆24Updated 10 years ago
- All TMF files that I extracted from Microsoft PDBs.☆12Updated 5 years ago
- ☆32Updated 5 months ago
- Framework for vulnerability fuzzing and reverse-engineering tool development.☆22Updated last year
- python-deepviz is a python wrapper for deepviz.com REST APIs☆11Updated 7 years ago
- Shellcode injection using debugging APIs☆17Updated 10 years ago
- Packed Malware Analyzer (PACKMAN)☆12Updated 8 years ago
- A VBScript for detecting VirtualBox☆20Updated 9 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆41Updated 11 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆27Updated 10 years ago
- A Single Library Parser to extract meta information,static analysis and detect macros within the files.☆1Updated 6 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Updated 7 years ago
- Scanner for Regin Virtual Filesystems☆26Updated 9 years ago
- Emu-strings project - JScript/VBScript automated dropper analysis system☆17Updated 3 years ago
- Sample libraries to be used with IAT Patcher☆33Updated 2 years ago
- If you want to exploit some kernel overflows, I've designed (long time ago) several levels ; have fun!☆7Updated 12 years ago
- ☆16Updated 7 years ago
- ☆28Updated 7 years ago
- ☆13Updated 7 years ago
- Format string exploit generation☆9Updated 9 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Updated 12 years ago
- a collection of yara rules for binary analysis☆24Updated 7 years ago
- Exploit kit analyzer☆21Updated 9 years ago