intezer / analyze-community-ghidra-plugin
Ghidra plugin for https://analyze.intezer.com
☆70Updated 2 years ago
Alternatives and similar repositories for analyze-community-ghidra-plugin:
Users that are interested in analyze-community-ghidra-plugin are comparing it to the libraries listed below
- Capa analysis importer for Ghidra.☆61Updated 4 years ago
- ☆67Updated last year
- Go Lang Portable Executable Parser☆39Updated 3 years ago
- Radare2 Metadata Extraction to Elasticsearch☆22Updated 9 months ago
- TA505 unpacker Python 2.7☆47Updated 4 years ago
- ☆18Updated 4 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- Flare-On solutions☆36Updated 5 years ago
- A modular Karton Framework service that unpacks common packers like UPX and others using the Qiling Framework.☆52Updated 3 years ago
- Small visualizator for PE files☆67Updated last year
- Parsers for custom malware formats ("Funky malware formats")☆93Updated 3 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆43Updated last year
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- Unpacking and decryption tools for the Emotet malware☆46Updated 3 years ago
- ☆26Updated last year
- Robust Automated Malware Unpacker☆84Updated last year
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆89Updated 5 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆74Updated 10 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆48Updated 6 years ago
- Malware Configuration Extraction Modules☆48Updated last year
- Yet another rule generator for Yara☆27Updated 4 years ago
- API Logger for Windows Executables☆78Updated 4 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆119Updated 4 years ago
- A collection of shellcode hashes☆17Updated 6 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆39Updated 5 years ago
- A small utility to deal with malware embedded hashes.☆49Updated last year
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆54Updated 3 weeks ago
- The following repository contains a modified version of SUNBURST with cracekd hashes, comments and annotations.☆56Updated 4 years ago
- This tool is the result of a reverse engineering process of the Windows service called SysMain. Time to interact with the prefetch files …☆30Updated 4 years ago
- ☆27Updated 2 years ago