ph0sec / CaptureBAT-clientLinks
Capture BAT is a behavioral analysis tool of applications for the Win32 operating system family.
☆32Updated 12 years ago
Alternatives and similar repositories for CaptureBAT-client
Users that are interested in CaptureBAT-client are comparing it to the libraries listed below
Sorting:
- Evil Reflective DLL Injection Finder☆47Updated 6 years ago
- CAPE monitor DLLs☆41Updated 5 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆75Updated 10 years ago
- DLL Injection Library & Tools☆71Updated 9 years ago
- Enumerate Windows Defender threat families and dump their names according category☆90Updated 6 years ago
- a program to detect reflective dll injection on a live machine☆74Updated 9 years ago
- Library and tools to access the Windows Prefetch File (SCCA) format.☆75Updated 6 months ago
- Windows link file (shortcuts) examiner☆68Updated last year
- This tool is the result of a reverse engineering process of the Windows service called SysMain. Time to interact with the prefetch files …☆31Updated 4 years ago
- CmdDesktopSwitch is a small utility that lists all windows desktops and provides the option to switch between them. This can be used to i…☆35Updated 9 years ago
- Blog posts☆30Updated 4 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆123Updated 4 years ago
- Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Updated 8 years ago
- Archive of ransomware decryptors☆30Updated 7 years ago
- Capa analysis importer for Ghidra.☆61Updated 4 years ago
- DotNext 2019 St. Petersburg Talk Demos☆40Updated 6 years ago
- It's not just UsnJrnl (USN Journal Records/Change Journal Records) parser.☆23Updated 6 years ago
- Metadata hash incorporating the Rich Header for robustness against packing and other malware tricks☆65Updated 3 years ago
- Windows Shortcut file (LNK) parser☆136Updated 2 years ago
- Rekall Memory Forensic Framework☆32Updated 5 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Updated 5 years ago
- Named pipe I/O ETW provider for Windows☆70Updated 4 years ago
- ☆22Updated 4 years ago
- My collection of unpackers for malware packers/crypters☆28Updated 7 years ago
- A simple API monitor for Windbg☆63Updated 8 years ago
- Discover TimeDateStamps In PE File☆17Updated 9 years ago
- MALM: Malware Monitor☆49Updated 12 years ago
- Parsers for custom malware formats ("Funky malware formats")☆96Updated 3 years ago
- ActiveMime File Format Documentation☆18Updated 4 years ago
- ☆71Updated last year