Python tool to resolve all strings in Go binaries obfuscated by garble
☆191Feb 21, 2025Updated last year
Alternatives and similar repositories for gostringungarbler
Users that are interested in gostringungarbler are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Binary Ninja plugin to deobfuscate strings obfuscated with the Garble project☆45Mar 6, 2025Updated last year
- Go symbol recovery tool☆988Mar 6, 2026Updated 2 months ago
- IDA plugin for automatic deobfuscation of opaque predicates by lifting microcode to z3 for SMT reasoning.☆60Apr 30, 2026Updated 3 weeks ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆110Jan 26, 2026Updated 3 months ago
- Redress - A tool for analyzing stripped Go binaries☆1,167May 9, 2026Updated last week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Heap encryption in Nim☆21Aug 25, 2024Updated last year
- NailaoLoader: Hiding Execution Flow via Patching☆23Feb 27, 2025Updated last year
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆134Jan 26, 2026Updated 3 months ago
- XrefGen is a professional-grade cross-reference generator that detects indirect references and complex control-flow patterns that IDA Pro…☆31Feb 1, 2026Updated 3 months ago
- Utilizing DLang For Offensive Operations.☆15May 29, 2025Updated 11 months ago
- A nim implementation of sRDI☆20Oct 18, 2023Updated 2 years ago
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆83Mar 14, 2025Updated last year
- Static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆347Jul 29, 2024Updated last year
- ☆31Feb 28, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Binary Ninja plugin for interacting with the OALabs HashDB service☆21Nov 1, 2024Updated last year
- Obfuscator-llvm Control Flow Flattening Deobfuscator☆263Apr 16, 2025Updated last year
- Obfuscate Go builds☆5,486Apr 22, 2026Updated 3 weeks ago
- Tools for analyzing EDR agents☆278Jun 10, 2024Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Aug 11, 2023Updated 2 years ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆82Jul 25, 2025Updated 9 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆286Sep 18, 2024Updated last year
- Tool to find code cave in PE image (x86 / x64) - Find empty space to place code in PE files☆74Aug 1, 2023Updated 2 years ago
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A command line Windows API tracing tool for Golang binaries.☆159Dec 4, 2023Updated 2 years ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆170Aug 23, 2024Updated last year
- remote process injections using pool party techniques☆71Jun 29, 2025Updated 10 months ago
- ☆34Jan 17, 2026Updated 4 months ago
- IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformati…☆1,830May 6, 2026Updated 2 weeks ago
- A tour of what some Rust language features look like after compilation.☆51Jun 7, 2023Updated 2 years ago
- Plugin interface for remote communications with Binary Ninja database and MCP server for interfacing with LLMs.☆65Apr 24, 2026Updated 3 weeks ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated last year
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Feb 20, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- a IDA plugin helps you to manage your IDA Comments☆26Sep 30, 2024Updated last year
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Jun 28, 2023Updated 2 years ago
- Symbol Recovery Tool for Nuitka Binaries☆87Dec 25, 2024Updated last year
- Rust symbol recovery tool☆83Feb 19, 2026Updated 3 months ago
- A powerful Python library and CLI tool for parsing, analyzing, and manipulating YARA rules through Abstract Syntax Tree (AST) representat…☆51Updated this week
- Retrieve inner payloads from Donut samples☆129Mar 12, 2026Updated 2 months ago
- Because AV evasion should be easy.☆872Nov 28, 2024Updated last year