myrtus0x0 / smoke_conf_extract
☆13Updated 2 years ago
Alternatives and similar repositories for smoke_conf_extract:
Users that are interested in smoke_conf_extract are comparing it to the libraries listed below
- Go Lang Portable Executable Parser☆39Updated 3 years ago
- UnpacMe IDA Byte Search☆28Updated last year
- Malware Configuration Extraction Modules☆49Updated last year
- ☆105Updated last year
- Capa analysis importer for Ghidra.☆61Updated 4 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- Writeups for CTF challenges☆30Updated last year
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆70Updated 11 months ago
- ☆68Updated last year
- mod to myaut2exe decompiler☆13Updated 7 years ago
- MWDB exercises☆19Updated 2 months ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆115Updated last year
- API Logger for Windows Executables☆78Updated 4 years ago
- TA505 unpacker Python 2.7☆47Updated 4 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- TrashDBG the world's worse debugger☆23Updated 3 years ago
- IDA python plugin to scan binary with Yara rules☆173Updated last year
- ☆15Updated 2 years ago
- Royal Road RTF Weaponizer object decoder☆24Updated 5 months ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆90Updated last week
- An IDA Pro extension for easier (malware) reverse engineering☆111Updated 2 years ago
- Yet another rule generator for Yara☆28Updated 4 years ago
- ☆31Updated 2 years ago
- Write-ups for FireEye's FLARE-On challenges☆25Updated 5 years ago
- ☆14Updated 2 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆25Updated 3 years ago
- Robust Automated Malware Unpacker☆84Updated last year
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆40Updated 5 years ago
- IDA Pro plugin for recognizing known hashes of API function names☆81Updated 2 years ago