mandiant / flare-qdbLinks
Command-line and Python debugger for instrumenting and modifying native software behavior on Windows and Linux.
☆164Updated 2 years ago
Alternatives and similar repositories for flare-qdb
Users that are interested in flare-qdb are comparing it to the libraries listed below
Sorting:
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 8 years ago
- Script analysis tool based on Frida.re☆129Updated 8 years ago
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆85Updated 3 years ago
- ☆99Updated last year
- Automated malware unpacker☆120Updated 9 years ago
- Frida.re based RunPE (and MapViewOfSection) extraction tool☆113Updated 8 years ago
- zer0m0n driver for cuckoo sandbox☆88Updated 9 years ago
- WinHeap Explorer repository.☆119Updated 7 years ago
- A set of scripts for a radare-based malware code analysis workflow☆68Updated 6 years ago
- ☆108Updated 8 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆92Updated 6 years ago
- Windows API tracer for malware (oldname: unitracer)☆119Updated 8 years ago
- ☆91Updated 9 years ago
- PyAna - Analyzing the Windows shellcode☆247Updated 9 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆86Updated 8 years ago
- Offline debugger for malware's reverse engineering☆115Updated 10 years ago
- Generating YARA rules based on binary code☆216Updated 4 years ago
- ☆52Updated 10 years ago
- Implementation of the DIMVA 2017 publication "Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps"☆69Updated 3 years ago
- Toolkit for enriching and speeding up static malware analysis☆168Updated 3 years ago
- A Tool to Unpack Self-Modifying Code using DynamoRIO☆141Updated 8 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Updated 8 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆146Updated 8 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Updated 4 years ago
- Wraps around various tools and provides some additional checks/information to produce a centralized report of a PE file.☆207Updated 11 years ago
- Yet another Python library to read and write PE/PE+ files.☆78Updated 9 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆70Updated 8 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆170Updated 8 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆264Updated 8 years ago