An experimental dynamic malware unpacker based on Intel Pin and PE-sieve
☆63Aug 21, 2024Updated last year
Alternatives and similar repositories for pin_n_sieve
Users that are interested in pin_n_sieve are comparing it to the libraries listed below
Sorting:
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- MalUnpack companion driver☆99Jun 17, 2024Updated last year
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆580Mar 8, 2024Updated 2 years ago
- [deprecated] Simple x64dbg plugin to save a full memory dump☆50Oct 10, 2022Updated 3 years ago
- ☆18Apr 4, 2019Updated 6 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Oct 17, 2018Updated 7 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆109May 27, 2021Updated 4 years ago
- c++ implementation of windows heavens gate☆70Feb 12, 2021Updated 5 years ago
- Some source code to demonstrate avoiding certain direct syscall detections by locating and JMPing to a legitimate syscall instruction wit…☆218Feb 20, 2023Updated 3 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Jan 8, 2022Updated 4 years ago
- A kernel mode Windows rootkit in development.☆49Dec 31, 2021Updated 4 years ago
- ☆29Jan 15, 2021Updated 5 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104May 14, 2020Updated 5 years ago
- Interprocess communication library, providing the ability to call functions from each other☆20Oct 3, 2019Updated 6 years ago
- x64dbg scripts for finding OEP of packers