hasherezade / tag_converterLinks
☆23Updated 5 years ago
Alternatives and similar repositories for tag_converter
Users that are interested in tag_converter are comparing it to the libraries listed below
Sorting:
- A small library helping to parse commandline parameters (for C/C++)☆58Updated 8 months ago
- Parsers for custom malware formats ("Funky malware formats")☆98Updated 4 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆58Updated 5 months ago
- A set of small utilities, helpers for PIN tracers☆36Updated 3 months ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆124Updated 5 years ago
- ☆73Updated 2 years ago
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Updated 7 years ago
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆55Updated 3 years ago
- CAPE monitor DLLs☆41Updated 6 years ago
- My collection of unpackers for malware packers/crypters☆28Updated 8 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- A collection of shellcode hashes☆17Updated 7 years ago
- Archive of ransomware decryptors☆34Updated 8 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 7 years ago
- Flare-On solutions☆37Updated 6 years ago
- ☆16Updated 4 years ago
- A ready-made template for a project based on libpeconv.☆51Updated 3 months ago
- ☆51Updated 5 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 7 years ago
- Experimental Windows .text section Patch Detector☆22Updated 11 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆27Updated 3 years ago
- Small visualizator for PE files☆70Updated 2 years ago
- ☆28Updated 5 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 8 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Updated 6 years ago
- ☆36Updated 6 years ago
- Demos and presentation from SECArmy Village Grayhat 2020☆37Updated 2 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆63Updated last year