☆39Sep 2, 2012Updated 13 years ago
Alternatives and similar repositories for NETDeob
Users that are interested in NETDeob are comparing it to the libraries listed below
Sorting:
- ☆17Apr 25, 2018Updated 7 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- ☆16Dec 31, 2016Updated 9 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- Sample of windows key logger.☆14Dec 27, 2019Updated 6 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Malware monitor template based on MinHook☆17Mar 29, 2015Updated 10 years ago
- Deobfuscator for Confuser 1.9.0.0 release☆166Apr 25, 2018Updated 7 years ago
- Abusing fts3_tokenizer☆12Jan 18, 2016Updated 10 years ago
- most string deobfuscators use Invoke to pick up the strings, however some obfuscators are using "GetCallingAssembly" to check if the meth…☆12Feb 24, 2019Updated 7 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- IDA ExtraPass PlugIn☆15Jan 24, 2016Updated 10 years ago
- Baml Decompiler and viewer for JetBrains dotPeek☆22Apr 25, 2012Updated 13 years ago
- NRefactory - Refactoring Your C# Code☆18Nov 11, 2020Updated 5 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- Unpacker for ILProtector☆30Feb 24, 2023Updated 3 years ago
- ☆38Oct 23, 2015Updated 10 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- Demo bootloaders - created just for fun☆23Jul 1, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/malware-lu☆57May 21, 2019Updated 6 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆11Jan 27, 2017Updated 9 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- Tool for inspecting Windows Phone applications☆28Jun 7, 2013Updated 12 years ago
- IDA Pro Plugins☆19May 31, 2015Updated 10 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- Encrypt, decrypt, and break caesar's cipher.☆10Jun 18, 2021Updated 4 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- ☆16Jan 14, 2016Updated 10 years ago
- All Blazor Demos☆10Jan 15, 2021Updated 5 years ago
- HookDetector.NET is a .NET Library to detect hooks in API functions☆27Nov 21, 2020Updated 5 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago