struppigel / PortExLinks
Java library to analyse Portable Executable files with a special focus on malware analysis and PE malformation robustness
☆524Updated 7 months ago
Alternatives and similar repositories for PortEx
Users that are interested in PortEx are comparing it to the libraries listed below
Sorting:
- A static analyzer for PE executables.☆1,100Updated 2 years ago
- PEframe is a open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents.☆619Updated 3 years ago
- ☆988Updated last week
- Portable Executable parsing library (from PE-bear)☆659Updated 3 months ago
- Official repository for Pyew.☆394Updated 6 years ago
- Automatic and platform-independent unpacker for Windows binaries based on emulation☆738Updated 5 months ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,223Updated 5 months ago
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆478Updated 2 years ago
- Drltrace is a library calls tracer for Windows and Linux applications.☆415Updated 5 years ago
- Binee: binary emulation environment☆530Updated 2 years ago
- A tool to detect and crash Cuckoo Sandbox☆296Updated last year
- This project aims at simplifying Windows API import recovery on arbitrary memory dumps☆261Updated 2 years ago
- InviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date…☆579Updated 3 years ago
- Labeless is a multipurpose IDA Pro plugin system for labels/comments synchronization with a debugger backend, with complex memory dumping…☆574Updated last year
- Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools☆463Updated 7 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆398Updated 9 years ago
- DRAKVUF Black-box Binary Analysis☆1,198Updated 2 months ago
- C++ application that uses memory and code hooks to detect packers☆274Updated 7 years ago
- Code written as part of our various malware investigations☆408Updated 2 months ago
- Collaborative malware analysis framework☆380Updated 7 years ago
- Windows registry file format specification☆353Updated 7 years ago
- Various snippets created during malware analysis☆463Updated 3 months ago
- Quickly debug shellcode extracted during malware analysis☆624Updated 2 years ago
- Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.☆518Updated last year
- Wraps around various tools and provides some additional checks/information to produce a centralized report of a PE file.☆208Updated 12 years ago
- Incident Response & Digital Forensics Debugging Extension☆387Updated 7 years ago
- Generating YARA rules based on binary code☆218Updated 4 years ago
- The new Cuckoo Monitor.☆352Updated last year
- Supporting Data Archives for Ghidra☆289Updated 5 years ago
- Volatility plugins developed and maintained by the community☆375Updated 4 years ago