mandiant / gostringungarblerLinks
Python tool to resolve all strings in Go binaries obfuscated by garble
☆124Updated 7 months ago
Alternatives and similar repositories for gostringungarbler
Users that are interested in gostringungarbler are comparing it to the libraries listed below
Sorting:
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆70Updated last month
- A command line Windows API tracing tool for Golang binaries.☆157Updated last year
- Retrieve inner payloads from Donut samples☆108Updated last year
- Binary Ninja plugin to deobfuscate strings obfuscated with the Garble project☆37Updated 7 months ago
- A collection of modules and scripts to help with analyzing Nim binaries☆79Updated last year
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆121Updated last year
- ☆109Updated 2 years ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆125Updated 5 months ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆163Updated last year
- ☆113Updated 2 months ago
- ☆38Updated 9 months ago
- Comprehensive Windows Syscall Extraction & Analysis Framework☆129Updated last month
- A dynamic unpacking tool☆143Updated 2 years ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆159Updated last week
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆124Updated this week
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆119Updated 2 months ago
- NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (eithe…☆228Updated last week
- Vulnerable driver research tool, result and exploit PoCs☆219Updated last year
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆333Updated 3 months ago
- FLARE Team's Binary Navigator☆284Updated 2 months ago
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆64Updated 6 months ago
- Collection of codes focused on Linux rootkits☆167Updated 2 weeks ago
- A robust, multiprocessing-capable, multi-family RAT config parser/config extractor for AsyncRAT, DcRAT, VenomRAT, QuasarRAT, XWorm, Xeno …☆53Updated 2 months ago
- Anti-analysis tool that obfuscates ELF files☆36Updated 4 years ago
- Tools for analyzing EDR agents☆264Updated last year
- Solutions and writeups for the Flare-On 11 (2024) reverse engineering challenge☆69Updated 9 months ago
- a tool used to analyze and monitor in named pipes☆184Updated 11 months ago
- Binary Exploitation Phrack CTF Challenge☆133Updated last month
- Userland exec PoC to be used as attack vector technique☆88Updated 3 weeks ago
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆217Updated 5 months ago