govcert-ch / ConfuserEx_IDAPython
IDA Python deobfuscation script for ConfuserEx binaries
☆35Updated 2 years ago
Alternatives and similar repositories for ConfuserEx_IDAPython:
Users that are interested in ConfuserEx_IDAPython are comparing it to the libraries listed below
- ☆31Updated 3 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Updated 2 years ago
- IDA plugin to deobfuscate emotet CFF☆17Updated 3 years ago
- Process Injection without R/W target memory and without creating a remote thread☆18Updated 3 years ago
- UnpacMe IDA Byte Search☆28Updated last year
- ☆25Updated 6 months ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆41Updated 4 months ago
- devirtualization vmprotect☆62Updated 2 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆33Updated last year
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆64Updated last year
- C# implementation to produce ROR-13 numeric hash for given function API name☆31Updated 5 years ago
- Simple x64dbg plugin to save a full memory dump☆50Updated 2 years ago
- WslinkVMAnalyzer is a tool to facilitate analysis of code protected by a virtual machine featured in Wslink malware☆46Updated 2 years ago
- ☆22Updated last year
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated last year
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆34Updated 3 years ago
- A small tool to unmap PE memory dumps.☆11Updated last year
- Easy-to-use IDA plugin for code emulation☆31Updated last year
- ☆28Updated 2 years ago
- Clone running process with ZwCreateProcess☆57Updated 4 years ago
- Small tool to convert beteween the PE alignments (raw and virtual).☆87Updated 2 years ago
- All LLVM binaries scrambled with SigBreaker and used to test against llvm-lit☆14Updated 3 weeks ago
- Windows kernel PDB data parsed into YAML☆36Updated 5 months ago
- Writeups for CTF challenges☆31Updated last year
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆16Updated 3 years ago
- ☆32Updated last year
- Go fastcall analysis for ida decompiler☆33Updated 2 months ago
- A driver to implement IOCTL hooking☆24Updated 3 years ago
- LLVM obfuscation pass, flattening at the basic block's level and turning each basic block into a dispacher and each instruction into a ne…☆46Updated 3 years ago