packing-box / dataset-packed-peLinks
Dataset of packed PE samples
☆36Updated last year
Alternatives and similar repositories for dataset-packed-pe
Users that are interested in dataset-packed-pe are comparing it to the libraries listed below
Sorting:
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆47Updated 8 months ago
- Native Python3 bindings for @horsicq's Detect-It-Easy☆72Updated 2 months ago
- Docker image gathering packers and tools for making datasets of packed executables and training machine learning models for packing detec…☆60Updated last week
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆72Updated last year
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆116Updated 2 years ago
- Parse .NET executable files.☆76Updated 3 weeks ago
- capemon: CAPE's monitor☆124Updated this week
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆115Updated 4 months ago
- ☆105Updated 2 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆117Updated last year
- Dataset of packed ELF samples☆19Updated 2 years ago
- Tools developed by the Zscaler ThreatLabz Threat Intelligence team☆83Updated 2 weeks ago
- Powershell script deobfuscation using AST in Python☆68Updated last year
- Python implementation of the Packed Executable iDentifier (PEiD)☆139Updated last year
- ☆74Updated last year
- Robust Automated Malware Unpacker☆85Updated 2 years ago
- API Logger for Windows Executables☆78Updated 4 years ago
- Batch script to compile a binary shellcode blob into an exe file☆87Updated 6 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Updated 2 years ago
- MalUnpack companion driver☆98Updated last year
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆83Updated 2 years ago
- Writeups for CTF challenges☆31Updated last year
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆165Updated last month
- A golang CLI tool to download malware from a variety of sources.☆148Updated last month
- Use YARA rules on Time Travel Debugging traces☆92Updated 2 years ago
- A collection of modules and scripts to help with analyzing Nim binaries☆78Updated 9 months ago
- IDA Pro plugin to aid with the analysis of native IIS modules☆19Updated last year
- Metadata hash incorporating the Rich Header for robustness against packing and other malware tricks☆67Updated 3 years ago
- IDA Pro plugin for recognizing known hashes of API function names☆81Updated 3 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Updated 2 years ago