imperva / frida-jit-unpacker
The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.
☆55Updated 10 months ago
Alternatives and similar repositories for frida-jit-unpacker:
Users that are interested in frida-jit-unpacker are comparing it to the libraries listed below
- Analysis of the vulnerability☆49Updated last year
- A simple commandline application to automatically decrypt strings from Obfuscator protected binaries☆38Updated 8 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 10 months ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆50Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆48Updated 6 months ago
- ☆25Updated 3 months ago
- Golang bindings for PE-sieve☆42Updated last year
- ☆18Updated this week
- ☆36Updated 2 months ago
- Proof-of-Concept for CVE-2024-26218☆49Updated 9 months ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated last year
- ☆58Updated 11 months ago
- Lena's scripts/code/resources for malware analysis☆25Updated 8 months ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆115Updated 7 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆85Updated last year
- ☆20Updated last year
- ☆24Updated last year
- ☆33Updated 2 months ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆57Updated last year
- Folder Or File Delete to Get System Shell on Current Session Desktop☆38Updated last month
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆33Updated last month
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆34Updated 5 months ago
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆83Updated 10 months ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆44Updated 3 months ago
- Report and exploit of CVE-2023-36427☆89Updated last year
- ☆49Updated 3 months ago
- A more reliable way of resolving syscall numbers in Windows☆48Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆76Updated 6 months ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated last year
- A few examples of how to trap virtual memory access on Windows.☆26Updated last month