lcorbasson / lnk-parseLinks
MS Windows LNK file parser
☆15Updated 9 years ago
Alternatives and similar repositories for lnk-parse
Users that are interested in lnk-parse are comparing it to the libraries listed below
Sorting:
- NSIS Reversing Suite with IDA Plugins☆112Updated 2 years ago
- ☆32Updated last year
- Automated library compilation and PDB annotation with CMake and IDA Pro☆23Updated 7 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 10 years ago
- Extract annoations from Ghidra into an X32/X64 dbg database☆57Updated 4 years ago
- A repository of example plugins for Relyze Desktop.☆34Updated 5 years ago
- Imports MSDN documentation into IDA Pro☆52Updated 14 years ago
- Collection of Compressor and Crypter unpackers☆105Updated 12 years ago
- BinCrowd Plugin for IDA Pro☆44Updated 14 years ago
- IDATACO IDA Pro Plugin☆46Updated 9 years ago
- Miscellanous scripts used for malware analysis☆23Updated 7 years ago
- Analysis PE file or Shellcode☆50Updated 9 years ago
- ☆99Updated last year
- Solarized Dark IDA Pro Theme☆66Updated 12 years ago
- pykd script to dynamically find vtables on heap (windows x86/x64)☆25Updated 11 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆58Updated 8 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆92Updated 6 years ago
- QEMU with rVMI extensions☆25Updated 8 years ago
- Enable Microsoft PDB support in Ghidra without installing Visual Studio☆37Updated 6 years ago
- ☆28Updated 11 years ago
- ☆100Updated last year
- ☆32Updated 10 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 9 years ago
- Ghidra consonance and make it more ida-ish☆16Updated 6 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 10 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- a collection of yara rules for binary analysis☆24Updated 8 years ago
- Memory forensics of virtualization environments☆48Updated 11 years ago
- ☆43Updated 7 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Updated 8 years ago