omr00t / flareon10_solutionsLinks
Solutions to Flare-On 10 CTF
☆13Updated last year
Alternatives and similar repositories for flareon10_solutions
Users that are interested in flareon10_solutions are comparing it to the libraries listed below
Sorting:
- Writeups for CTF challenges☆32Updated last year
- IDA Pro plugin for recognizing known hashes of API function names☆81Updated 3 years ago
- ☆74Updated last year
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆118Updated 2 years ago
- A collection of modules and scripts to help with analyzing Nim binaries☆79Updated last year
- ☆22Updated last year
- ☆109Updated last month
- ☆74Updated last year
- TrashDBG the world's worse debugger☆23Updated 3 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆56Updated 3 years ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆71Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆45Updated 2 years ago
- General malware analysis stuff☆37Updated last year
- ☆83Updated 2 months ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆89Updated last year
- Malware dynamic instrumentation tool based on frida framework☆110Updated 5 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆120Updated last year
- Royal Road RTF Weaponizer object decoder☆24Updated last year
- ☆114Updated 3 months ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Updated last year
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆112Updated 4 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆130Updated last year
- This is a little plugin to copy disassembly in a way that is usable in YARA rules!☆47Updated 6 months ago
- Powershell script deobfuscation using AST in Python☆72Updated last month
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 3 years ago
- Go Lang Portable Executable Parser☆38Updated 4 years ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆33Updated 6 years ago
- ☆53Updated 6 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated 2 years ago
- ☆27Updated 10 months ago