mandiant / gostringungarblerLinks
Python tool to resolve all strings in Go binaries obfuscated by garble
☆119Updated 6 months ago
Alternatives and similar repositories for gostringungarbler
Users that are interested in gostringungarbler are comparing it to the libraries listed below
Sorting:
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆70Updated 3 weeks ago
- A command line Windows API tracing tool for Golang binaries.☆158Updated last year
- Retrieve inner payloads from Donut samples☆107Updated last year
- Binary Ninja plugin to deobfuscate strings obfuscated with the Garble project☆35Updated 6 months ago
- Comprehensive Windows Syscall Extraction & Analysis Framework☆118Updated 2 weeks ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆120Updated 5 months ago
- Binary Exploitation Phrack CTF Challenge☆129Updated 3 weeks ago
- ☆113Updated 2 months ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆160Updated last year
- ☆109Updated 2 years ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆122Updated 3 months ago
- A collection of modules and scripts to help with analyzing Nim binaries☆78Updated 11 months ago
- ☆89Updated 7 months ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆119Updated last year
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆117Updated last month
- A dynamic unpacking tool☆140Updated last year
- ☆153Updated last month
- ☆37Updated 9 months ago
- NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (eithe…☆227Updated 2 months ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆393Updated 5 months ago
- Tools for analyzing EDR agents☆249Updated last year
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆154Updated last month
- Slides and files for the Reversing Rust Binaries: One step beyond strings workshop at REcon 2024, presented on June 28, 2024.☆78Updated last year
- A robust, multiprocessing-capable, multi-family RAT config parser/config extractor for AsyncRAT, DcRAT, VenomRAT, QuasarRAT, XWorm, Xeno …☆51Updated last month
- Userland exec PoC to be used as attack vector technique☆85Updated 7 months ago
- Vulnerable driver research tool, result and exploit PoCs☆215Updated last year
- Collection of codes focused on Linux rootkits☆153Updated this week
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆78Updated last week
- Cheat sheet to detect and remove linux kernel rootkit☆72Updated 9 months ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆122Updated this week