pan-unit42 / dotnetfile
☆100Updated last year
Related projects ⓘ
Alternatives and complementary repositories for dotnetfile
- Use YARA rules on Time Travel Debugging traces☆86Updated last year
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆114Updated last year
- Malware Configuration Extraction Modules☆47Updated 11 months ago
- ☆111Updated last week
- runsc loads 32/64 bit shellcode (depending on how runsc is compiled) in a way that makes it easy to load in a debugger. This code is base…☆36Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆42Updated last year
- A golang CLI tool to download malware from a variety of sources.☆141Updated 9 months ago
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆158Updated 2 weeks ago
- ☆13Updated 2 years ago
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆89Updated 3 years ago
- Writeups for CTF challenges☆30Updated last year
- IDA Pro plugin for recognizing known hashes of API function names☆81Updated 2 years ago
- Powershell script deobfuscation using AST in Python☆62Updated 10 months ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆62Updated 7 months ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆124Updated 11 months ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆110Updated 4 months ago
- API Logger for Windows Executables☆77Updated 4 years ago
- YARA rule analyzer to improve rule quality and performance☆93Updated 11 months ago
- Parse .NET executable files.☆74Updated last week
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- An automatic unpacker and logger for DotNet Framework targeting files☆249Updated last year
- A collection of modules and scripts to help with analyzing Nim binaries☆66Updated last month
- A guide on how to write fast and memory friendly YARA rules☆126Updated last year
- Native Python3 bindings for @horsicq's Detect-It-Easy☆48Updated 3 weeks ago
- Research notes☆115Updated last month
- Elastic Security Labs releases☆52Updated 3 weeks ago
- Scripts, Yara rules and other files developed during malware investigations☆24Updated 2 years ago
- MalUnpack companion driver☆92Updated 5 months ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆48Updated 8 months ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆56Updated last year