n1ght-w0lf / HawkEyeView external linksLinks
Malware dynamic instrumentation tool based on frida framework
☆110Jun 7, 2020Updated 5 years ago
Alternatives and similar repositories for HawkEye
Users that are interested in HawkEye are comparing it to the libraries listed below
Sorting:
- A small utility to deal with malware embedded hashes.☆53Sep 21, 2023Updated 2 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆130Nov 25, 2023Updated 2 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Feb 24, 2023Updated 2 years ago
- Code snippets for Qiling Tutorials☆21Aug 22, 2020Updated 5 years ago
- ☆22Jul 7, 2023Updated 2 years ago
- Analyses in IDA/Hex-Rays☆87Apr 6, 2023Updated 2 years ago
- A Pin Tool for tracing API calls etc☆1,616Feb 8, 2026Updated last week
- ☆55Nov 11, 2021Updated 4 years ago
- An IDA Pro extension for easier (malware) reverse engineering☆116Aug 2, 2022Updated 3 years ago
- Script analysis tool based on Frida.re☆130May 31, 2017Updated 8 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- A repository where I share my injection implemintations☆29Jul 26, 2020Updated 5 years ago
- Windows 10 Live Information viewer☆37Jan 27, 2022Updated 4 years ago
- Windows kernel and user mode emulation.☆1,841Feb 4, 2026Updated last week
- ☆230Dec 8, 2022Updated 3 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆447Oct 26, 2022Updated 3 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆124Sep 9, 2020Updated 5 years ago
- My malware analysis code snippets☆28Jul 15, 2023Updated 2 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Aug 17, 2019Updated 6 years ago
- a PE Loader and Windows API tracer. Useful in malware analysis.☆143Sep 19, 2022Updated 3 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Simple windows API logger☆109Sep 19, 2019Updated 6 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆13Jul 21, 2019Updated 6 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Mar 2, 2021Updated 4 years ago
- Binee: binary emulation environment☆530Feb 25, 2023Updated 2 years ago
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- Windows registry samples☆24Nov 18, 2018Updated 7 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆106Jun 11, 2025Updated 8 months ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,263Updated this week
- ☆113Sep 10, 2025Updated 5 months ago
- Distributed malware processing framework based on Python, Redis and S3.☆462Dec 1, 2025Updated 2 months ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆18Sep 3, 2024Updated last year
- Malduck is your ducky companion in malware analysis journeys☆349Jun 22, 2025Updated 7 months ago