intezer / analyze-community-ghidra-pluginLinks
Ghidra plugin for https://analyze.intezer.com
☆71Updated 2 years ago
Alternatives and similar repositories for analyze-community-ghidra-plugin
Users that are interested in analyze-community-ghidra-plugin are comparing it to the libraries listed below
Sorting:
- Capa analysis importer for Ghidra.☆62Updated 4 years ago
- ☆71Updated last year
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- TA505 unpacker Python 2.7☆47Updated 5 years ago
- Radare2 Metadata Extraction to Elasticsearch☆23Updated last year
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- Parsers for custom malware formats ("Funky malware formats")☆96Updated 3 years ago
- ☆18Updated 4 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Updated 5 years ago
- A modular Karton Framework service that unpacks common packers like UPX and others using the Qiling Framework.☆57Updated 4 years ago
- pyGoRE - Python library for analyzing Go binaries☆64Updated 3 years ago
- Flare-On solutions☆36Updated 5 years ago
- API Logger for Windows Executables☆78Updated 4 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 4 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 3 years ago
- Yet another rule generator for Yara☆29Updated 2 months ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆92Updated 6 years ago
- ☆23Updated 6 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Royal Road RTF Weaponizer object decoder☆24Updated 11 months ago
- Malware dynamic instrumentation tool based on frida framework☆108Updated 5 years ago
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆119Updated 2 years ago
- Use this library to automatically extract PE files compressed with aplib from a binary blob.☆34Updated 6 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- Symbol hash for ELF files☆112Updated 3 years ago
- A powershell parser for https://github.com/ufrisk/MemProcFS☆44Updated 4 years ago
- Robust Automated Malware Unpacker☆85Updated 2 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆56Updated 3 weeks ago
- Windows link file (shortcuts) examiner☆68Updated last year
- An IDA Pro extension for easier (malware) reverse engineering☆115Updated 3 years ago