glmcdona / MALM
MALM: Malware Monitor
☆49Updated 11 years ago
Alternatives and similar repositories for MALM:
Users that are interested in MALM are comparing it to the libraries listed below
- Sample libraries to be used with IAT Patcher☆33Updated 2 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- Automated library compilation and PDB annotation with CMake and IDA Pro☆20Updated 6 years ago
- Plugin for x64dbg to generate Yara rules from function basic blocks.☆35Updated 7 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆75Updated 10 years ago
- Analysis PE file or Shellcode☆49Updated 8 years ago
- ☆33Updated 7 years ago
- CAPE monitor DLLs☆39Updated 5 years ago
- Random Code Store☆17Updated 2 years ago
- ☆42Updated 6 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆64Updated 12 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆16Updated 8 years ago
- ViDi Visual Disassembler (experimental)☆76Updated 2 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆50Updated 6 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 5 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- ☆30Updated 9 years ago
- ☆32Updated 6 years ago
- This is the python wrapper for The Security Framework SRDF☆49Updated 10 years ago
- Bootkits Revisited☆41Updated 10 years ago
- Modified edition of cuckoomon☆49Updated 6 years ago
- Anti-AV compilation☆42Updated 11 years ago
- Blackhat 2012 Sample Codes☆93Updated 8 years ago
- ☆27Updated 3 years ago
- ☆51Updated 8 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- APIInfo Plugin (x86) - A Plugin For x64dbg☆50Updated 6 years ago
- ☆21Updated 9 years ago
- C++ wrapper for YARA.☆45Updated 5 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago