eset / slides
Slides from presentations done by ESET researchers
☆20Updated 9 years ago
Alternatives and similar repositories for slides:
Users that are interested in slides are comparing it to the libraries listed below
- a collection of yara rules for binary analysis☆24Updated 7 years ago
- a collection of public yara rules☆26Updated 5 years ago
- Automated library compilation and PDB annotation with CMake and IDA Pro☆20Updated 6 years ago
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago
- Scanner for Regin Virtual Filesystems☆26Updated 10 years ago
- ☆32Updated 7 months ago
- Yet another Python library to read and write PE/PE+ files.☆80Updated 8 years ago
- Malware analyses and helpful scripts☆29Updated 2 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 7 years ago
- Analysis PE file or Shellcode☆49Updated 8 years ago
- Scanner for the SkeletonKey Malware☆30Updated 10 years ago
- ☆42Updated 6 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- r2yara - Module for Yara using radare2 information☆34Updated last year
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆53Updated 7 years ago
- ☆49Updated 9 years ago
- The educational Animus malware☆17Updated 5 years ago
- IDATACO IDA Pro Plugin☆47Updated 8 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆37Updated 11 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆20Updated 9 years ago
- The plugin is an integration of Virus Battle API to the well known IDA Disassembler.☆19Updated 9 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆53Updated 9 years ago
- Static and automated/dynamic malware analysis☆46Updated 9 years ago
- A collection of Volatility Framework plugins.☆26Updated 11 years ago
- The Horrific Omnipotent Rootkit☆22Updated 7 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- Swiss Army knife for raw bytes manipulation & interception☆55Updated last year
- Test suite for bypassing Malware sandboxes.☆38Updated 10 years ago