fkie-cad / RoAMer
Robust Automated Malware Unpacker
☆84Updated last year
Alternatives and similar repositories for RoAMer:
Users that are interested in RoAMer are comparing it to the libraries listed below
- IDA python plugin to scan binary with Yara rules☆173Updated last year
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆90Updated last week
- An IDA Pro extension for easier (malware) reverse engineering☆111Updated 2 years ago
- Parsers for custom malware formats ("Funky malware formats")☆95Updated 3 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- Go Lang Portable Executable Parser☆39Updated 3 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆40Updated 5 years ago
- Analyses in IDA/Hex-Rays☆80Updated last year
- Capa analysis importer for Ghidra.☆61Updated 4 years ago
- Yet another rule generator for Yara☆28Updated 4 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆120Updated 4 years ago
- ☆68Updated last year
- This project aims at simplifying Windows API import recovery on arbitrary memory dumps☆247Updated last year
- ☆58Updated 3 years ago
- SMDA is a minimalist recursive disassembler library that is optimized for accurate Control Flow Graph (CFG) recovery from memory dumps.☆231Updated last week
- Malware dynamic instrumentation tool based on frida framework☆104Updated 4 years ago
- Yara rule making tool (IDA Pro & Binary Ninja & Cutter & Ghidra Plugin)☆229Updated 5 months ago
- Static unpacker for FinSpy VM☆100Updated 3 years ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆70Updated 11 months ago
- scripts/plugins for IDA Pro☆171Updated 2 months ago
- IDA Pro plugin for recognizing known hashes of API function names☆81Updated 2 years ago
- ☆224Updated 2 years ago
- Malware Configuration Extraction Modules☆49Updated last year
- Generating YARA rules based on binary code☆206Updated 3 years ago
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆181Updated 4 years ago
- BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)☆124Updated 3 years ago
- Learn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.☆79Updated 4 years ago
- A modular Karton Framework service that unpacks common packers like UPX and others using the Qiling Framework.☆53Updated 3 years ago
- LERN GHIDRA☆90Updated 2 years ago
- Port of the binary diffing library, diaphora, for radare2 and mariadb☆50Updated last year