malice-plugins / pescanLinks
Malice PExecutable Plugin
☆16Updated 4 years ago
Alternatives and similar repositories for pescan
Users that are interested in pescan are comparing it to the libraries listed below
Sorting:
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆17Updated 8 years ago
- Analysis PE file or Shellcode☆50Updated 9 years ago
- Modified edition of cuckoomon☆23Updated 5 years ago
- Sandbox d'analyse de malware pour Windows 7 avec un client TCP en mode noyau☆19Updated 9 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆41Updated 12 years ago
- Modified edition of cuckoomon☆49Updated 7 years ago
- ☆33Updated 6 years ago
- Anti-AV compilation☆44Updated 11 years ago
- MALM: Malware Monitor☆50Updated 12 years ago
- ransomware_begone☆42Updated 9 years ago
- Simple tool for unpacking packed/protected malware executables.☆33Updated 13 years ago
- ☆28Updated 8 years ago
- Framework complet d'analyse de malware☆12Updated 9 years ago
- Malware monitor template based on MinHook☆16Updated 10 years ago
- Malware analyses and helpful scripts☆29Updated 3 years ago
- ☆13Updated 8 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆28Updated 11 years ago
- OpenHIPS prevents exploitation of Windows systems☆35Updated 12 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 8 years ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Updated 9 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆13Updated 9 years ago
- Automatically exported from code.google.com/p/verify-sigs☆18Updated 8 years ago
- ☆28Updated 3 years ago
- Malware.lu configuration extractor☆25Updated 11 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 10 years ago
- CAPE monitor DLLs☆41Updated 5 years ago
- Plugin for x64dbg to generate Yara rules from function basic blocks.☆36Updated 7 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 8 years ago
- Examples for detection of hidden processes on windows☆34Updated 11 years ago