PageBuster - dump all executable pages of packed processes.
☆206Mar 31, 2021Updated 5 years ago
Alternatives and similar repositories for pagebuster
Users that are interested in pagebuster are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆13Apr 20, 2021Updated 5 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆226Feb 9, 2021Updated 5 years ago
- Files for my solution to the SSTIC 2021 challenge☆15Jun 14, 2021Updated 4 years ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆76Nov 12, 2019Updated 6 years ago
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆84Jun 29, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Sep 5, 2021Updated 4 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 6 years ago
- symbolic execution plugin for binary ninja☆356Jan 26, 2026Updated 3 months ago
- Some Ghidra scripts to automate my reverse-engineering tasks☆20Mar 18, 2021Updated 5 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Aug 17, 2019Updated 6 years ago
- A query aggregator for OSINT based threat hunting☆938Mar 7, 2026Updated 2 months ago
- grap: define and match graph patterns within binaries☆154May 5, 2022Updated 4 years ago
- Control-flow-flattening and string deobfuscator☆160Nov 8, 2021Updated 4 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆76Jul 6, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Virtual Machine Introspection, Tracing & Debugging☆599Feb 22, 2022Updated 4 years ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆226Jun 9, 2020Updated 5 years ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,167Nov 14, 2020Updated 5 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆103May 14, 2020Updated 6 years ago
- MODeflattener deobfuscates control flow flattened functions obfuscated by OLLVM using Miasm.☆208Jul 23, 2021Updated 4 years ago
- NinjaDiff is a binary diffing plugin for Binary Ninja. Read more on our blog, and contribute code & improvements!☆70Nov 24, 2021Updated 4 years ago
- ☆72Jul 8, 2021Updated 4 years ago
- A DLL that serves OutputDebugString content over a TCP connection☆35Sep 23, 2021Updated 4 years ago
- A library for dynamic binary rewriting☆59Feb 10, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆76Sep 30, 2021Updated 4 years ago
- Obfuscate specific windows apis with different apis☆1,020Feb 21, 2021Updated 5 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆184May 2, 2021Updated 5 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆183Nov 30, 2017Updated 8 years ago
- Translates WinDbg "dt" structure dump to a C structure☆133Oct 16, 2016Updated 9 years ago
- A novel technique to hide code from debuggers & disassemblers☆161Aug 9, 2024Updated last year
- VMX intrinsics plugin for Hex-Rays decompiler☆74Oct 28, 2019Updated 6 years ago
- Intermediate x86 instruction representation for use in obfuscation/deobfuscation.☆60Jul 3, 2025Updated 10 months ago
- Open-source symbolic execution framework: https://maat.re☆649Feb 22, 2026Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆231Apr 7, 2023Updated 3 years ago
- ☆12Aug 10, 2019Updated 6 years ago
- Safely execute an arbitrary x86 instruction☆204Feb 6, 2024Updated 2 years ago
- Exploration of x86-64 ISA using speculative execution.☆317Jan 8, 2026Updated 4 months ago
- A fast and accurate disassembler☆749Apr 17, 2026Updated last month
- Use angr in Ghidra☆618Jul 29, 2024Updated last year
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆863Feb 2, 2024Updated 2 years ago