fkie-cad / RoAMerView external linksLinks
Robust Automated Malware Unpacker
☆87Apr 26, 2023Updated 2 years ago
Alternatives and similar repositories for RoAMer
Users that are interested in RoAMer are comparing it to the libraries listed below
Sorting:
- An IDA Pro extension for easier (malware) reverse engineering☆116Aug 2, 2022Updated 3 years ago
- ☆32Apr 24, 2022Updated 3 years ago
- LLVM Without The ROP Gadgets!☆25Jan 9, 2024Updated 2 years ago
- Parsing of YARA rules into AST and building new rulesets in C++.☆129Jan 25, 2026Updated 3 weeks ago
- An extremely experimental Binary Ninja importer for the type layout information emitted by the -Zprint-type-sizes flag of the Rust compil…☆38Jul 3, 2023Updated 2 years ago
- X86 disassembler benchmark☆10Jun 11, 2021Updated 4 years ago
- Dynamic unpacker based on PE-sieve☆796Sep 13, 2025Updated 5 months ago
- ☆27Jun 29, 2023Updated 2 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Jan 15, 2022Updated 4 years ago
- SMDA is a minimalist recursive disassembler library that is optimized for accurate Control Flow Graph (CFG) recovery from memory dumps.☆252Jan 16, 2026Updated last month
- ☆45Apr 10, 2021Updated 4 years ago
- A sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research☆468Apr 10, 2023Updated 2 years ago
- Minidump loader for Binary Ninja☆15Sep 25, 2025Updated 4 months ago
- A way to detect DBI frameworks, Debuggers and VMs.☆24Nov 17, 2020Updated 5 years ago
- VMI-Unpack - A Virtual Machine Introspection (VMI) based generic unpacker.☆57Jan 16, 2020Updated 6 years ago
- Automatic YARA rule generation for Malpedia☆168Sep 8, 2022Updated 3 years ago
- Analyses in IDA/Hex-Rays☆87Apr 6, 2023Updated 2 years ago
- ☆15Apr 8, 2023Updated 2 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆42Sep 18, 2018Updated 7 years ago
- ☆28May 10, 2020Updated 5 years ago
- This project aims at simplifying Windows API import recovery on arbitrary memory dumps☆262Mar 27, 2023Updated 2 years ago
- Generating YARA rules based on binary code☆220Oct 7, 2021Updated 4 years ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 2 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆130Nov 25, 2023Updated 2 years ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Sep 5, 2021Updated 4 years ago
- Exports monitoring plugin for x64dbg☆22Mar 14, 2023Updated 2 years ago
- An obfuscator bases on llvm for multiple language and platform☆19Jun 28, 2017Updated 8 years ago
- This PoC illustrates our work on asymmetric white-box cryptography, it can be used to generate a set of lookup tables used for lattice-ba…☆21Mar 24, 2021Updated 4 years ago
- Automatic and platform-independent unpacker for Windows binaries based on emulation☆739Aug 18, 2025Updated 5 months ago
- ☆34Nov 11, 2021Updated 4 years ago
- open source malware analysis and research notes dump☆26Aug 30, 2023Updated 2 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆124May 18, 2025Updated 8 months ago
- A research decompiler implemented as a Binary Ninja plugin.☆218Jan 27, 2026Updated 2 weeks ago
- Control-flow-flattening and string deobfuscator☆160Nov 8, 2021Updated 4 years ago
- Using the peculiar behaviour of the VPGATHER instructions to determine if an address will fault before it is truly accessed. All done in …☆53Dec 30, 2025Updated last month
- ptrace-backed dynamic instrumentation utility for x86_64 linux☆16Apr 3, 2022Updated 3 years ago
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆854Feb 2, 2024Updated 2 years ago
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆171Feb 5, 2026Updated last week
- ☆35Jul 20, 2021Updated 4 years ago