n1ght-w0lf / HawkEye
Malware dynamic instrumentation tool based on frida framework
☆101Updated 4 years ago
Related projects: ⓘ
- An IDA Pro extension for easier (malware) reverse engineering☆109Updated 2 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 4 years ago
- Write-ups for crackmes and CTF challenges☆49Updated last year
- ☆97Updated 10 months ago
- IDA Pro plugin for recognizing known hashes of API function names☆82Updated 2 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆22Updated last year
- IDA python plugin to scan binary with Yara rules☆167Updated 7 months ago
- Multi-tool reverse engineering collaboration solution.☆133Updated 5 months ago
- Ghidra scripts such as a RC4 decrypter, Yara search, stack string decoder, etc.☆157Updated 4 years ago
- Parsers for custom malware formats ("Funky malware formats")☆92Updated 2 years ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆82Updated 2 months ago
- Go Lang Portable Executable Parser☆37Updated 3 years ago
- ☆66Updated last year
- Capa analysis importer for Ghidra.☆61Updated 3 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆63Updated 3 years ago
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆177Updated 3 years ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆114Updated last year
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆133Updated this week
- A utility to fix intentionally corrupted UPX packed files.☆79Updated last year
- API Logger for Windows Executables☆77Updated 3 years ago
- This framework enables user to discover JOP gagdets and can automate building a complete JOP chain to bypass DEP. JOP ROCKET is the ultim…☆96Updated 2 weeks ago
- Malware Configuration Extraction Modules☆48Updated 9 months ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆73Updated 2 months ago
- Writeups for CTF challenges☆28Updated 10 months ago
- Ghidra scripts for malware analysis☆84Updated 8 months ago
- Robust Automated Malware Unpacker☆84Updated last year
- IDA plugin to pinpoint obfuscated code☆132Updated 2 years ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆61Updated 5 months ago
- Notes on using the Python bindings for the Unicorn Engine☆66Updated 4 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆117Updated 4 years ago