Unicorn PE function runner
☆59Jul 4, 2017Updated 8 years ago
Alternatives and similar repositories for Unico
Users that are interested in Unico are comparing it to the libraries listed below
Sorting:
- Analysis PE file or Shellcode☆50Jul 28, 2016Updated 9 years ago
- Basic x86 Symbolic Execution for educational purposes☆18May 8, 2017Updated 8 years ago
- Windows API tracer for malware (oldname: unitracer)☆120Oct 16, 2017Updated 8 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- Windows build files for the VMHunt Intel PIN Trace tool☆19Nov 26, 2018Updated 7 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- libemu shim layer and win32 environment for Unicorn Engine☆73Apr 14, 2017Updated 8 years ago
- A tool to investigate the Windows device manager☆13Feb 12, 2019Updated 7 years ago
- Demonstrate the new FileDispositionInfoEx behavior☆15Nov 6, 2017Updated 8 years ago
- a binary x86win32 code obfuscator using virtual machine☆31Jan 8, 2017Updated 9 years ago
- Utility for dumping all the information Capstone has on given instructions.☆23Oct 1, 2021Updated 4 years ago
- Runtime Runtime-Oriented Programming (ROP) protection☆11Feb 17, 2019Updated 7 years ago
- WhoCalls can query a directory of files, find the binaries, and search for a user specified Win API import. It and works with both 32-bit…☆18Jul 2, 2022Updated 3 years ago
- UNIPE - A small framwork to execute PE files with UniCorn☆47Jan 25, 2018Updated 8 years ago
- A blanket execution/min hash semantic hash tool for binary function identification☆18Apr 22, 2016Updated 9 years ago
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆14Mar 26, 2015Updated 10 years ago
- hook detector using emulation and comparing static with dynamic outputs☆17Aug 11, 2023Updated 2 years ago
- Simple shellcode decoder using unicorn-engine☆100Oct 17, 2015Updated 10 years ago
- Window Executable file Function tracer using Debugging API☆44Sep 26, 2019Updated 6 years ago
- A loadable dll that tracks memory changes, IAT hooks, and dynamically emplaced "JMP" in the x86 host executable.☆12Oct 22, 2023Updated 2 years ago
- Cmulator is ( x86 - x64 ) Scriptable Reverse Engineering Sandbox Emulator for shellcode and PE binaries . Based on Unicorn & Zydis Engin…☆303Sep 16, 2022Updated 3 years ago
- ☆14May 1, 2021Updated 4 years ago
- old code from 2007/2008 which uses split TLB to trace OEP☆16Jun 16, 2018Updated 7 years ago
- penter hook example and driver time recorder☆31Oct 2, 2017Updated 8 years ago
- core of pkn game hacking project. Including mainly for process management, memory management, and DLL injecttion. Also PE analysis, windo…☆68Mar 2, 2019Updated 7 years ago
- AMD64 PE Emulator in Python.☆85Nov 16, 2023Updated 2 years ago
- Windows 10 PE image loader (LDR) NTDLL component toolbox☆50Oct 22, 2019Updated 6 years ago
- XDV is disassembler or debugger that works based on the extension plugin.☆55Sep 3, 2019Updated 6 years ago
- .netアプリケーションの関数を実行時に置き換えるプログラム☆15Jan 21, 2017Updated 9 years ago
- A collection of Windows Administrator tools☆18Jan 1, 2014Updated 12 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- ☆20Nov 6, 2024Updated last year
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Dec 9, 2015Updated 10 years ago
- Simple utility to watch directory change notifications on a given path☆20Oct 6, 2017Updated 8 years ago
- NextB的基于敏感哈希的恶意文件相似度比较工具(C发行版本)☆20Nov 20, 2019Updated 6 years ago
- PIITracker: Automatic Tracking of Personally Identifiable Information in Windows☆20Apr 1, 2018Updated 7 years ago
- deprecated☆46Mar 20, 2019Updated 6 years ago
- An API Monitor based on Instrumentation☆43Dec 19, 2017Updated 8 years ago
- User-mode part of Zerokit platform☆22Mar 30, 2019Updated 6 years ago