n1ght-w0lf / pe-unmapperLinks
A small tool to unmap PE memory dumps.
☆11Updated last year
Alternatives and similar repositories for pe-unmapper
Users that are interested in pe-unmapper are comparing it to the libraries listed below
Sorting:
- ☆22Updated last year
- ☆26Updated 11 months ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆117Updated 2 years ago
- ☆74Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Updated 2 years ago
- ☆25Updated last year
- General malware analysis stuff☆37Updated last year
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆120Updated last year
- Winbindex bot to pull in binaries for specific releases☆48Updated 2 years ago
- IDA Pro plugin to aid with the analysis of native IIS modules☆19Updated last year
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Updated 2 years ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆33Updated 6 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Updated 3 years ago
- Small visualizator for PE files☆70Updated 2 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆28Updated 3 years ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆71Updated last year
- MalUnpack companion driver☆99Updated last year
- Extract data of TTD trace file to a minidump☆30Updated 2 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Updated 2 years ago
- A post-processing script for TinyTracer☆37Updated 2 years ago
- A collection of shellcode hashes☆17Updated 7 years ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Updated last year
- ☆32Updated 3 years ago
- IDA Python scripts☆41Updated 5 months ago
- Use YARA rules on Time Travel Debugging traces☆92Updated 2 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated 2 years ago
- Writeups for CTF challenges☆31Updated last year
- UnpacMe IDA Byte Search☆29Updated last year
- IDA Python deobfuscation script for ConfuserEx binaries☆35Updated 3 years ago
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 3 years ago