Parsers for custom malware formats ("Funky malware formats")
☆98Jan 8, 2022Updated 4 years ago
Alternatives and similar repositories for funky_malware_formats
Users that are interested in funky_malware_formats are comparing it to the libraries listed below
Sorting:
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆58Aug 6, 2025Updated 6 months ago
- A template for projects using both libPeConv and MS Detours☆16Oct 5, 2025Updated 5 months ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- A wrapper for capstone for bearparser☆16Oct 8, 2025Updated 4 months ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆63Aug 21, 2024Updated last year
- Flare-On solutions☆37Oct 11, 2019Updated 6 years ago
- Demos of various (also non standard) persistence methods used by malware☆224Mar 5, 2023Updated 3 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- MalUnpack companion driver☆99Jun 17, 2024Updated last year
- Windows syscall fuzzer that I used in 2017 & 2018. Not much to say about it but maybe helpful to someone. At least syscall information it…☆20Nov 20, 2019Updated 6 years ago
- Set of antianalysis techniques found in malware☆133Aug 25, 2023Updated 2 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Oct 17, 2018Updated 7 years ago
- Archive of ransomware decryptors☆34Dec 7, 2017Updated 8 years ago
- ☆36Oct 27, 2019Updated 6 years ago
- Set of my small utils related to cryptography, encoding, decoding etc☆95Sep 1, 2025Updated 6 months ago
- A set of small utilities, helpers for PIN tracers☆37Feb 15, 2026Updated 2 weeks ago
- Dynamic unpacker based on PE-sieve☆799Sep 13, 2025Updated 5 months ago
- ☆76Nov 30, 2023Updated 2 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Aug 1, 2020Updated 5 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- ☆23May 28, 2021Updated 4 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Jul 7, 2020Updated 5 years ago
- A ready-made template for a project based on libpeconv.☆52Oct 31, 2025Updated 4 months ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Sep 16, 2017Updated 8 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Mar 2, 2021Updated 5 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Apr 13, 2018Updated 7 years ago
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆187Apr 22, 2025Updated 10 months ago
- Small visualizator for PE files☆70Sep 20, 2023Updated 2 years ago
- ☆30Nov 8, 2017Updated 8 years ago
- Various scripts for different malware families☆106Apr 12, 2021Updated 4 years ago
- A small library helping to parse commandline parameters (for C/C++)☆57May 25, 2025Updated 9 months ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104May 14, 2020Updated 5 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆185Mar 30, 2019Updated 6 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆229Mar 22, 2023Updated 2 years ago
- ☆110May 19, 2019Updated 6 years ago
- Various snippets created during malware analysis☆464Oct 3, 2025Updated 5 months ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆580Mar 8, 2024Updated last year
- Subtract one PE file from another!☆20Oct 1, 2021Updated 4 years ago