Python tool to resolve all strings in Go binaries obfuscated by garble
☆192Feb 21, 2025Updated last year
Alternatives and similar repositories for gostringungarbler
Users that are interested in gostringungarbler are comparing it to the libraries listed below
Sorting:
- Binary Ninja plugin to deobfuscate strings obfuscated with the Garble project☆44Mar 6, 2025Updated last year
- Go symbol recovery tool☆939Updated this week
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆86Jan 26, 2026Updated last month
- Redress - A tool for analyzing stripped Go binaries☆1,151Feb 23, 2026Updated 2 weeks ago
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆105Jan 26, 2026Updated last month
- NailaoLoader: Hiding Execution Flow via Patching☆22Feb 27, 2025Updated last year
- ☆33Jan 17, 2026Updated last month
- Heap encryption in Nim☆20Aug 25, 2024Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- A nim implementation of sRDI☆20Oct 18, 2023Updated 2 years ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated last year
- Static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆331Jul 29, 2024Updated last year
- XrefGen is a professional-grade cross-reference generator that detects indirect references and complex control-flow patterns that IDA Pro…☆29Feb 1, 2026Updated last month
- Utilizing DLang For Offensive Operations.☆14May 29, 2025Updated 9 months ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆38Feb 16, 2026Updated 3 weeks ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆163Aug 23, 2024Updated last year
- Tools for analyzing EDR agents☆278Jun 10, 2024Updated last year
- FLARE Team's Binary Navigator☆312Feb 23, 2026Updated 2 weeks ago
- Stage 0☆169Dec 18, 2024Updated last year
- Obfuscator-llvm Control Flow Flattening Deobfuscator☆245Apr 16, 2025Updated 10 months ago
- Obfuscate Go builds☆5,330Updated this week
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆80Mar 14, 2025Updated 11 months ago
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- remote process injections using pool party techniques☆70Jun 29, 2025Updated 8 months ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆79Jul 25, 2025Updated 7 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Aug 11, 2023Updated 2 years ago
- A powerful Python library and CLI tool for parsing, analyzing, and manipulating YARA rules through Abstract Syntax Tree (AST) representat…☆51Dec 20, 2025Updated 2 months ago
- Rust Library Recognition Project for Rust Malware by the MSTIC-MIRAGE Team☆346Feb 12, 2026Updated 3 weeks ago
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆122Jul 19, 2025Updated 7 months ago
- IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformati…☆1,754Mar 3, 2026Updated last week
- Retrieve inner payloads from Donut samples☆120Dec 1, 2025Updated 3 months ago
- ☆86Jan 21, 2025Updated last year
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆125Dec 6, 2024Updated last year
- Tool to find code cave in PE image (x86 / x64) - Find empty space to place code in PE files☆72Aug 1, 2023Updated 2 years ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆61Feb 5, 2025Updated last year
- Evasion by machine code de-optimization.☆417Jul 22, 2024Updated last year
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- Because AV evasion should be easy.☆859Nov 28, 2024Updated last year