n1ght-w0lf / HawkEyeLinks
Malware dynamic instrumentation tool based on frida framework
☆110Updated 5 years ago
Alternatives and similar repositories for HawkEye
Users that are interested in HawkEye are comparing it to the libraries listed below
Sorting:
- Go Lang Portable Executable Parser☆38Updated 4 years ago
- Write-ups for crackmes and CTF challenges☆52Updated 2 years ago
- IDA python plugin to scan binary with Yara rules☆179Updated last year
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- IDA Pro plugin for recognizing known hashes of API function names☆81Updated 3 years ago
- An IDA Pro extension for easier (malware) reverse engineering☆115Updated 3 years ago
- TrashDBG the world's worse debugger☆23Updated 3 years ago
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆68Updated 5 years ago
- ☆72Updated 2 years ago
- Capa analysis importer for Ghidra.☆63Updated 4 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- IDA plugin to pinpoint obfuscated code☆141Updated 3 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆89Updated last year
- Ghidra plugin for https://analyze.intezer.com☆72Updated 3 years ago
- Malware Configuration Extraction Modules☆51Updated last year
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆94Updated this week
- Multi-tool reverse engineering collaboration solution.☆142Updated last year
- Tools for inspecting YARA bytecode☆21Updated 5 years ago
- Parsers for custom malware formats ("Funky malware formats")☆97Updated 3 years ago
- ☆28Updated 5 years ago
- ☆109Updated last month
- Yet another rule generator for Yara☆29Updated 4 months ago
- This framework enables user to discover JOP gagdets and can automate building a complete JOP chain to bypass DEP. JOP ROCKET is the ultim…☆108Updated last year
- Robust Automated Malware Unpacker☆85Updated 2 years ago
- A small utility to deal with malware embedded hashes.☆52Updated 2 years ago
- Writeups for CTF challenges☆32Updated last year
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆71Updated last year
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated 4 months ago
- Yara rule making tool (IDA Pro & Binary Ninja & Cutter & Ghidra Plugin)☆240Updated last year
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆69Updated 4 years ago