hasherezade / mal_unpack_drvLinks
MalUnpack companion driver
☆97Updated last year
Alternatives and similar repositories for mal_unpack_drv
Users that are interested in mal_unpack_drv are comparing it to the libraries listed below
Sorting:
- ☆148Updated 2 years ago
- a PE Loader and Windows API tracer. Useful in malware analysis.☆143Updated 3 years ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆124Updated 9 months ago
- ☆164Updated 4 years ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆118Updated 2 years ago
- Windows kernel PDB data parsed into YAML☆41Updated last week
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆36Updated 2 years ago
- Simple windows API logger☆109Updated 6 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆94Updated 3 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆120Updated last year
- Binary Ninja plugin for exploring Structured Exception Handlers☆82Updated last year
- Parse .NET executable files.☆78Updated 2 months ago
- ☆72Updated 2 years ago
- Small visualizator for PE files☆70Updated 2 years ago
- Abusing exceptions for code execution.☆113Updated 2 years ago
- ☆63Updated last year
- ☆74Updated last year
- Advanced driver monitoring utility.☆217Updated 3 years ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆126Updated 2 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆255Updated 3 years ago
- Small tool to convert beteween the PE alignments (raw and virtual).☆105Updated 2 years ago
- Set of antianalysis techniques found in malware☆131Updated 2 years ago
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆86Updated 5 years ago
- Run Processes as PPL with ELAM☆172Updated 3 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆89Updated last year
- IDA plugin for quickly copying disassembly as encoded hex bytes☆65Updated 3 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆75Updated 4 years ago
- A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.☆115Updated 3 years ago
- An x64dbg plugin which marks XFG call signatures as data☆77Updated 2 years ago
- Writeups for CTF challenges☆33Updated 2 years ago