hasherezade / mal_unpack_drvLinks
MalUnpack companion driver
☆97Updated last year
Alternatives and similar repositories for mal_unpack_drv
Users that are interested in mal_unpack_drv are comparing it to the libraries listed below
Sorting:
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆118Updated 2 years ago
- a PE Loader and Windows API tracer. Useful in malware analysis.☆143Updated 3 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆36Updated 2 years ago
- ☆72Updated 2 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆94Updated 3 years ago
- ☆149Updated 2 years ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆124Updated 9 months ago
- Abusing exceptions for code execution.☆113Updated 2 years ago
- Parse .NET executable files.☆80Updated 3 months ago
- Binary Ninja plugin for exploring Structured Exception Handlers☆82Updated last year
- ☆164Updated 4 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆122Updated last year
- Set of antianalysis techniques found in malware☆131Updated 2 years ago
- Advanced driver monitoring utility.☆217Updated 3 years ago
- ☆75Updated 2 years ago
- Simple windows API logger☆109Updated 6 years ago
- Small tool to convert beteween the PE alignments (raw and virtual).☆106Updated 2 years ago
- Small visualizator for PE files☆70Updated 2 years ago
- Windows kernel PDB data parsed into YAML☆41Updated last month
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆75Updated 4 years ago
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆86Updated 5 years ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆71Updated last year
- A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.☆115Updated 3 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆257Updated 3 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago
- Recon 2023 slides and code☆80Updated 2 years ago
- Resolve DOS MZ executable symbols at runtime☆95Updated 4 years ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆127Updated 2 years ago
- IDA plugin for quickly copying disassembly as encoded hex bytes☆65Updated 3 years ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆34Updated 6 years ago