mandiant / speakeasyLinks
Windows kernel and user mode emulation.
☆1,760Updated 6 months ago
Alternatives and similar repositories for speakeasy
Users that are interested in speakeasy are comparing it to the libraries listed below
Sorting:
- Dynamic unpacker based on PE-sieve☆765Updated 2 weeks ago
- A Pin Tool for tracing API calls etc☆1,539Updated 2 weeks ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,234Updated 2 weeks ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,205Updated this week
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆831Updated last year
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆634Updated last week
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,450Updated 3 weeks ago
- Automatic and platform-independent unpacker for Windows binaries based on emulation☆715Updated last month
- A curated list of IDA x64DBG, Ghidra and OllyDBG plugins.☆1,433Updated last year
- PE-bear (builds only)☆782Updated 2 years ago
- A Binary Genetic Traits Lexer Framework☆516Updated last month
- High Octane Triage Analysis☆772Updated this week
- Quickly debug shellcode extracted during malware analysis☆615Updated 2 years ago
- Some of my publicly available Malware analysis and Reverse engineering.☆850Updated last year
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆1,160Updated 2 years ago
- DRAKVUF Black-box Binary Analysis☆1,168Updated this week
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆822Updated 3 years ago
- AV/EDR evasion via direct system calls.☆1,930Updated 2 years ago
- InviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date…☆571Updated 3 years ago
- Assortment of hashing algorithms used in malware☆374Updated last month
- Collaborative Malware Analysis Platform at Scale☆763Updated this week
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,144Updated 4 years ago
- A static analyzer for PE executables.☆1,085Updated last year
- Process Hollowing (Malware Technique)☆1,353Updated 5 months ago
- IDA Pro utilities from FLARE team☆2,387Updated 11 months ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,282Updated 4 months ago
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆710Updated 5 years ago
- The multi-platform memory acquisition tool.☆845Updated 3 months ago
- AV/EDR evasion via direct system calls.☆1,735Updated 3 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆583Updated last year