myrtus0x0 / smoke_conf_extract
☆13Updated 2 years ago
Alternatives and similar repositories for smoke_conf_extract:
Users that are interested in smoke_conf_extract are comparing it to the libraries listed below
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- UnpacMe IDA Byte Search☆28Updated last year
- ☆105Updated last year
- Capa analysis importer for Ghidra.☆61Updated 4 years ago
- Malware Configuration Extraction Modules☆49Updated last year
- ☆71Updated last year
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- Writeups for CTF challenges☆31Updated last year
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆70Updated last year
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆91Updated last month
- Parsers for custom malware formats ("Funky malware formats")☆96Updated 3 years ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆114Updated 2 years ago
- Dockerized Setup for the MinHash-based Code Recognition & Investigation Toolkit (MCRIT)☆16Updated last month
- IDA Pro plugin for recognizing known hashes of API function names☆81Updated 2 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆25Updated 3 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆40Updated 5 years ago
- ☆31Updated 2 years ago
- mod to myaut2exe decompiler☆14Updated 7 years ago
- MWDB exercises☆19Updated 2 months ago
- ☆14Updated 2 years ago
- ☆14Updated 2 years ago
- IDARay is an IDA Pro plugin that matches the database against multiple YARA files which themselves may contain multiple rules.☆18Updated 6 years ago
- Royal Road RTF Weaponizer object decoder☆24Updated 6 months ago
- Metadata hash incorporating the Rich Header for robustness against packing and other malware tricks☆64Updated 3 years ago
- ☆73Updated last year
- Use YARA rules on Time Travel Debugging traces☆88Updated last year
- ☆15Updated 2 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆75Updated 10 years ago