futex / Reverse
☆13Updated 6 years ago
Alternatives and similar repositories for Reverse:
Users that are interested in Reverse are comparing it to the libraries listed below
- ☆23Updated 4 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- Shim database persistence (Fin7 TTP)☆37Updated 5 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- TA505 unpacker Python 2.7☆47Updated 4 years ago
- Antivirus Emulator Fingerprints☆28Updated 6 years ago
- ☆16Updated 3 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆43Updated 3 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- A collection of shellcode hashes☆17Updated 6 years ago
- Babel-Shellfish deobfuscates and scans Powershell scripts on real-time right before each line execution.☆43Updated 6 years ago
- A repository where I share my injection implemintations☆29Updated 4 years ago
- Royal Road RTF Weaponizer object decoder☆24Updated 6 months ago
- Capa analysis importer for Ghidra.☆61Updated 4 years ago
- Different code-injections techniques under a common tool☆30Updated 4 years ago
- Another Repo of Malware. Enjoy. <3☆59Updated 6 years ago
- ☆26Updated last year
- ☆43Updated 6 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 5 years ago
- ☆18Updated 4 years ago
- medium-rare☆28Updated 5 years ago
- A small utility to deal with malware embedded hashes.☆49Updated last year
- Specialized tool to dump Position Independent Code.☆22Updated 4 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 7 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆19Updated 4 years ago
- ☆22Updated 4 years ago
- ☆14Updated 2 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Updated 5 years ago