Windows API tracer for malware (oldname: unitracer)
☆120Oct 16, 2017Updated 8 years ago
Alternatives and similar repositories for tracecorn
Users that are interested in tracecorn are comparing it to the libraries listed below
Sorting:
- Analysis PE file or Shellcode☆50Jul 28, 2016Updated 9 years ago
- Basic x86 Symbolic Execution for educational purposes☆18May 8, 2017Updated 8 years ago
- Unicorn PE function runner☆59Jul 4, 2017Updated 8 years ago
- ☆13Jul 26, 2025Updated 7 months ago
- [Not work] Deobfuscate obfuscated binaries!☆11Dec 16, 2016Updated 9 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- UNIPE - A small framwork to execute PE files with UniCorn☆47Jan 25, 2018Updated 8 years ago
- ☆13Jul 11, 2017Updated 8 years ago
- a modified version base on Tracecorn☆20Oct 29, 2019Updated 6 years ago
- Use WinDBG to trace the Windows API calls of any Portable Executable file☆32Apr 13, 2017Updated 8 years ago
- Towards Generic Deobfuscation of Windows API Calls☆50May 21, 2019Updated 6 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Dec 9, 2015Updated 10 years ago
- ☆99Jun 19, 2024Updated last year
- PyAna - Analyzing the Windows shellcode☆247Feb 16, 2016Updated 10 years ago
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- collection of used Tools for CTFs☆15Oct 24, 2021Updated 4 years ago
- ☆12Jun 14, 2017Updated 8 years ago
- ☆30May 23, 2017Updated 8 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- Past presentation materials☆10Jul 10, 2018Updated 7 years ago
- modify binary Portable Executable to hook its export functions☆67Jan 13, 2019Updated 7 years ago
- A blanket execution/min hash semantic hash tool for binary function identification☆18Apr 22, 2016Updated 9 years ago
- reverse engineering extension plugin for windbg