packing-box / awesome-executable-packingLinks
A curated list of awesome resources related to executable packing
☆1,428Updated 3 months ago
Alternatives and similar repositories for awesome-executable-packing
Users that are interested in awesome-executable-packing are comparing it to the libraries listed below
Sorting:
- A curated list of IDA x64DBG, Ghidra and OllyDBG plugins.☆1,433Updated last year
- A Pin Tool for tracing API calls etc☆1,539Updated 2 weeks ago
- Some of my publicly available Malware analysis and Reverse engineering.☆850Updated last year
- A curated list of awesome Ghidra materials☆1,305Updated 3 years ago
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆831Updated last year
- Linker/Compiler/Tool detector for Windows, Linux and MacOS.☆569Updated this week
- PE file viewer/editor for Windows, Linux and MacOS.☆1,140Updated this week
- Dynamic unpacker based on PE-sieve☆768Updated 2 weeks ago
- Windows kernel and user mode emulation.☆1,760Updated 6 months ago
- Automatic and platform-independent unpacker for Windows binaries based on emulation☆717Updated last month
- windows kernel security development☆2,040Updated 3 years ago
- State-of-the-art native debugging tools☆3,483Updated 3 weeks ago
- IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformati…☆1,504Updated this week
- Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)☆2,415Updated 5 months ago
- Go symbol recovery tool☆824Updated last month
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,450Updated 3 weeks ago
- A curated list of awesome reverse engineering resources for various topics☆566Updated last year
- x64 Dynamic Reverse Engineering Toolkit☆710Updated 2 years ago
- A Trace Explorer for Reverse Engineers☆1,466Updated last year
- x64 binary obfuscator☆1,896Updated 2 years ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,234Updated 3 weeks ago
- Assortment of hashing algorithms used in malware☆379Updated last month
- PE-bear (builds only)☆782Updated 2 years ago
- A Binary Genetic Traits Lexer Framework☆516Updated last month
- Playing with the VMProtect software protection. Automatic deobfuscation of pure functions using symbolic execution and LLVM.☆1,320Updated 3 years ago
- Windows NT Syscall tables☆1,332Updated last month
- A curated list of awesome malware persistence tools and resources.☆243Updated 2 months ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,282Updated 4 months ago
- High Octane Triage Analysis☆772Updated this week
- awesome-linux-rootkits☆1,947Updated 8 months ago