struppigel / PortexAnalyzerGUI
Graphical interface for PortEx, a Portable Executable and Malware Analysis Library
☆132Updated 7 months ago
Alternatives and similar repositories for PortexAnalyzerGUI:
Users that are interested in PortexAnalyzerGUI are comparing it to the libraries listed below
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆204Updated last year
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆134Updated 7 months ago
- ☆111Updated this week
- A ProcessMonitor visualization application written in rust.☆178Updated last year
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆75Updated 6 months ago
- Enumerate various traits from Windows processes as an aid to threat hunting☆186Updated 3 years ago
- Finding secrets in kernel and user memory☆114Updated last year
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆52Updated last month
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆115Updated last year
- Batch script to compile a binary shellcode blob into an exe file☆83Updated 5 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆115Updated 7 months ago
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆154Updated last month
- A command line Windows API tracing tool for Golang binaries.☆155Updated last year
- ☆154Updated 9 months ago
- Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows☆203Updated 2 years ago
- Repository of Yara Rules☆100Updated this week
- Detect strange memory regions and DLLs☆177Updated 3 years ago
- General malware analysis stuff☆36Updated 5 months ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆101Updated 2 years ago
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆105Updated 2 weeks ago
- A dynamic unpacking tool☆132Updated last year
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆225Updated this week
- A list of all the DLLs export in C:\windows\system32\☆214Updated 3 years ago
- Small visualizator for PE files☆67Updated last year
- A golang CLI tool to download malware from a variety of sources.☆142Updated last year
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆159Updated 4 months ago
- ☆199Updated 3 months ago
- Use YARA rules on Time Travel Debugging traces☆89Updated last year
- Run Your Payload Without Running Your Payload☆180Updated 2 years ago