pan-unit42 / dotnetfileLinks
☆110Updated 2 months ago
Alternatives and similar repositories for dotnetfile
Users that are interested in dotnetfile are comparing it to the libraries listed below
Sorting:
- A golang CLI tool to download malware from a variety of sources.☆151Updated 4 months ago
- Malware Configuration Extraction Modules☆51Updated last year
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆130Updated last year
- runsc loads 32/64 bit shellcode (depending on how runsc is compiled) in a way that makes it easy to load in a debugger. This code is base…☆38Updated 2 years ago
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆112Updated 4 years ago
- Use YARA rules on Time Travel Debugging traces☆95Updated 2 years ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆118Updated 2 years ago
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆168Updated last week
- A guide on how to write fast and memory friendly YARA rules☆157Updated 9 months ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆71Updated last year
- Powershell script deobfuscation using AST in Python☆72Updated last month
- ☆13Updated 3 years ago
- ☆114Updated this week
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆45Updated 2 years ago
- Powershell Linter☆84Updated last week
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated 2 years ago
- Code snips and notes☆137Updated 3 years ago
- Dump quarantined files from Windows Defender☆67Updated 3 years ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Updated last year
- API Logger for Windows Executables☆80Updated 5 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆120Updated last year
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆118Updated 2 years ago
- An automatic unpacker and logger for DotNet Framework targeting files☆264Updated 2 years ago
- Parse .NET executable files.☆78Updated 2 months ago
- Writeups for CTF challenges☆33Updated 2 years ago
- TrashDBG the world's worse debugger☆23Updated 3 years ago
- Metadata hash incorporating the Rich Header for robustness against packing and other malware tricks☆69Updated 4 years ago
- JPCERT/CC public YARA rules repository☆110Updated 11 months ago
- Repository of Yara Rules☆127Updated last week
- Scripts to aid analysis of files obfuscated with ScatterBee.☆23Updated 2 years ago