ixiacom / ATILinks
Ixia ATI team open source or generally public material. Anything added here MUST be approved by Ixia Management.
☆66Updated 6 years ago
Alternatives and similar repositories for ATI
Users that are interested in ATI are comparing it to the libraries listed below
Sorting:
- Parsers for custom malware formats ("Funky malware formats")☆96Updated 3 years ago
- ☆71Updated last year
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- ☆115Updated 9 years ago
- FLARE Kernel Shellcode Loader☆179Updated 6 years ago
- Automatically generate AV byte signatures from sets of similar binaries.☆279Updated 8 months ago
- Capa analysis importer for Ghidra.☆62Updated 4 years ago
- ☆106Updated 6 years ago
- API Logger for Windows Executables☆78Updated 4 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Updated 5 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆77Updated 10 years ago
- Automatically rebuild Import Address Table for dumped PE file. With python bindings!☆120Updated 6 years ago
- Yet another rule generator for Yara☆29Updated 2 months ago
- This tool is the result of a reverse engineering process of the Windows service called SysMain. Time to interact with the prefetch files …☆31Updated 4 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆123Updated 4 years ago
- Ghidra plugin for https://analyze.intezer.com☆71Updated 2 years ago
- a program to detect reflective dll injection on a live machine☆74Updated 9 years ago
- Set of antianalysis techniques found in malware☆131Updated 2 years ago
- IDA python plugin to scan binary with Yara rules☆177Updated last year
- Radare2 Metadata Extraction to Elasticsearch☆23Updated last year
- Symbol hash for ELF files☆112Updated 3 years ago
- TA505 unpacker Python 2.7☆47Updated 5 years ago
- Enumerate Windows Defender threat families and dump their names according category☆91Updated 6 years ago
- Use this library to automatically extract PE files compressed with aplib from a binary blob.☆34Updated 6 years ago
- Tools for inspecting YARA bytecode☆20Updated 5 years ago
- Write-ups for crackmes and CTF challenges☆52Updated 2 years ago
- Robust Automated Malware Unpacker☆85Updated 2 years ago
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆119Updated 2 years ago
- Documentation and supporting script sample for Windows Exploit Guard☆157Updated 3 years ago