hasherezade / mal_unpack_drvLinks
MalUnpack companion driver
☆99Updated last year
Alternatives and similar repositories for mal_unpack_drv
Users that are interested in mal_unpack_drv are comparing it to the libraries listed below
Sorting:
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆118Updated 2 years ago
- Binary Ninja plugin for exploring Structured Exception Handlers☆82Updated last year
- ☆148Updated 2 years ago
- a PE Loader and Windows API tracer. Useful in malware analysis.☆143Updated 3 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆94Updated 4 years ago
- ☆163Updated 4 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆124Updated last year
- A Python script to download PDB files associated with a Portable Executable (PE)☆127Updated 11 months ago
- ☆72Updated 2 years ago
- Small visualizator for PE files☆70Updated 2 years ago
- Parse .NET executable files.☆83Updated 4 months ago
- Simple windows API logger☆109Updated 6 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆36Updated 2 years ago
- Abusing exceptions for code execution.☆113Updated 2 years ago
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆87Updated 5 years ago
- ☆75Updated 2 years ago
- Windows kernel PDB data parsed into YAML☆42Updated 2 months ago
- Small tool to convert beteween the PE alignments (raw and virtual).☆108Updated 3 years ago
- Advanced driver monitoring utility.☆217Updated 3 years ago
- ☆65Updated last year
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆127Updated 2 years ago
- Set of antianalysis techniques found in malware☆133Updated 2 years ago
- API Logger for Windows Executables☆80Updated 5 years ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆71Updated last year
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆258Updated 3 years ago
- An x64dbg plugin which marks XFG call signatures as data☆78Updated 2 years ago
- A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.☆116Updated 3 years ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆34Updated 6 years ago
- UnpacMe IDA Byte Search☆29Updated 2 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆75Updated 4 years ago