milankovo / YaraVM
This repository contains an IDA processor for loading and disassembling compiled yara rules.
☆41Updated 4 months ago
Alternatives and similar repositories for YaraVM:
Users that are interested in YaraVM are comparing it to the libraries listed below
- ☆25Updated 6 months ago
- UnpacMe IDA Byte Search☆28Updated last year
- A small tool to unmap PE memory dumps.☆11Updated last year
- Extract data of TTD trace file to a minidump☆28Updated last year
- Winbindex bot to pull in binaries for specific releases☆48Updated last year
- IDA Pro plugin to aid with the analysis of native IIS modules☆18Updated 9 months ago
- ☆24Updated last year
- A few examples of how to trap virtual memory access on Windows.☆30Updated 4 months ago
- ☆31Updated 3 years ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆31Updated 5 years ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆46Updated last week
- ☆52Updated 6 months ago
- IDA Python deobfuscation script for ConfuserEx binaries☆35Updated 2 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Updated 2 years ago
- ☆19Updated 2 months ago
- javascript extension of windbg for hacker.☆15Updated last year
- ☆45Updated last month
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆35Updated last year
- WslinkVMAnalyzer is a tool to facilitate analysis of code protected by a virtual machine featured in Wslink malware☆46Updated 2 years ago
- Different tools for Microsoft Hyper-V researching☆57Updated 11 months ago
- ☆29Updated 2 months ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆28Updated 2 years ago
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Updated last year
- Report and exploit of CVE-2024-21305.☆34Updated last year
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆71Updated last year
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆53Updated this week
- Report and exploit of CVE-2023-36427☆90Updated last year
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆116Updated 9 months ago
- Remove WPP calls from hexrays decompiled code☆48Updated last month
- Rule Engine for Dynamic Malware Analysis and Research☆23Updated 3 weeks ago