reb311ion / emeraldLinks
Import DynamoRIO drcov code coverage data into Ghidra
☆44Updated last year
Alternatives and similar repositories for emerald
Users that are interested in emerald are comparing it to the libraries listed below
Sorting:
- x86 bootloader emulation with Miasm (case of NotPetya)☆42Updated 6 years ago
- ☆34Updated 4 years ago
- Flare-On solutions☆37Updated 6 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- IDA plugin to explore and browse tags☆56Updated 6 years ago
- ☆72Updated 4 years ago
- ☆50Updated 3 years ago
- A fast execution trace symbolizer for Windows.☆129Updated last year
- IDA script for vmprotect Windows Api address decoder☆51Updated 4 years ago
- Polymorphic VM and PoliCTF '17 reversing challenge.☆73Updated last year
- pyGoRE - Python library for analyzing Go binaries☆65Updated 3 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- An Integrity-Check Monitoring Pintool☆58Updated 4 years ago
- ☆76Updated 4 years ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆76Updated 6 years ago
- Python bindings for the Microsoft Hypervisor Platform APIs.☆79Updated 6 years ago
- My notes about Genyatyk VM crackme☆26Updated 5 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 8 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆73Updated last year
- Windows API listing in JSON format - generated from SDK headers + SDK API documentation☆66Updated 5 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆30Updated 5 years ago
- ☆72Updated 2 years ago
- Collects extended function properties from IDA Pro databases☆94Updated 4 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Updated 6 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Updated 6 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 6 years ago
- ☆87Updated last year
- ☆35Updated 2 years ago
- ☆36Updated 5 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago