ixiacom / ATILinks
Ixia ATI team open source or generally public material.  Anything added here MUST be approved by Ixia Management.
☆66Updated 6 years ago
Alternatives and similar repositories for ATI
Users that are interested in ATI are comparing it to the libraries listed below
Sorting:
- ☆73Updated 2 years ago
 - Parsers for custom malware formats ("Funky malware formats")☆97Updated 3 years ago
 - ☆115Updated 9 years ago
 - Go Lang Portable Executable Parser☆38Updated 4 years ago
 - Capa analysis importer for Ghidra.☆63Updated 4 years ago
 - Transfer EIP control to shellcode during malware analysis investigation☆77Updated 11 years ago
 - Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆124Updated 5 years ago
 - Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Updated 6 years ago
 - Documentation and supporting script sample for Windows Exploit Guard☆158Updated last month
 - x86 emulation and shellcode detection☆154Updated last year
 - TA505 unpacker Python 2.7☆47Updated 5 years ago
 - WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
 - Metadata hash incorporating the Rich Header for robustness against packing and other malware tricks☆69Updated 4 years ago
 - Enumerate Windows Defender threat families and dump their names according category☆93Updated 6 years ago
 - FLARE Kernel Shellcode Loader☆178Updated 6 years ago
 - API Logger for Windows Executables☆80Updated 5 years ago
 - ☆64Updated last year
 - Yet another rule generator for Yara☆29Updated 4 months ago
 - Automatically rebuild Import Address Table for dumped PE file. With python bindings!☆121Updated 6 years ago
 - Ghidra plugin for https://analyze.intezer.com☆72Updated 3 years ago
 - a program to detect reflective dll injection on a live machine☆76Updated 9 years ago
 - Python implementation of LZNT1 compression/decompression☆65Updated 5 years ago
 - Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆141Updated 3 years ago
 - This tool is the result of a reverse engineering process of the Windows service called SysMain. Time to interact with the prefetch files …☆31Updated 5 years ago
 - A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆55Updated 6 years ago
 - Userland API monitor for threat hunting☆58Updated 5 years ago
 - Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆85Updated 3 years ago
 - Set of antianalysis techniques found in malware☆131Updated 2 years ago
 - Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
 - POC viruses I have created to demo some ideas☆59Updated 5 years ago