intezer / analyze-community-ghidra-pluginLinks
Ghidra plugin for https://analyze.intezer.com
☆72Updated 3 years ago
Alternatives and similar repositories for analyze-community-ghidra-plugin
Users that are interested in analyze-community-ghidra-plugin are comparing it to the libraries listed below
Sorting:
- ☆72Updated 2 years ago
- Capa analysis importer for Ghidra.☆63Updated 4 years ago
- Go Lang Portable Executable Parser☆38Updated 4 years ago
- TA505 unpacker Python 2.7☆47Updated 5 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- Parsers for custom malware formats ("Funky malware formats")☆97Updated 3 years ago
- ☆18Updated 5 years ago
- Royal Road RTF Weaponizer object decoder☆24Updated last year
- Flare-On solutions☆37Updated 6 years ago
- A modular Karton Framework service that unpacks common packers like UPX and others using the Qiling Framework.☆58Updated 4 years ago
- pyGoRE - Python library for analyzing Go binaries☆65Updated 3 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Updated 6 years ago
- Radare2 Metadata Extraction to Elasticsearch☆23Updated last year
- Yet another rule generator for Yara☆29Updated 4 months ago
- ☆23Updated 6 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆77Updated 10 years ago
- Malware dynamic instrumentation tool based on frida framework☆110Updated 5 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆124Updated 5 years ago
- A small utility to deal with malware embedded hashes.☆52Updated 2 years ago
- A powershell parser for https://github.com/ufrisk/MemProcFS☆43Updated 4 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 3 years ago
- Rekall Memory Forensic Framework☆33Updated 6 years ago
- Windows link file (shortcuts) examiner☆67Updated last year
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Updated last month
- API Logger for Windows Executables☆79Updated 5 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- ☆23Updated 4 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 4 years ago
- ☆53Updated 7 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago