tomchop / unxorView external linksLinks
unXOR will search a XORed file and try to guess the key using known-plaintext attacks.
☆145Apr 23, 2020Updated 5 years ago
Alternatives and similar repositories for unxor
Users that are interested in unxor are comparing it to the libraries listed below
Sorting:
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆88Jun 11, 2018Updated 7 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- Automated malware unpacker☆120Mar 5, 2016Updated 9 years ago
- Balbuzard is a package of malware analysis tools in python to extract patterns of interest from suspicious files (IP addresses, domain na…☆140Jan 10, 2020Updated 6 years ago
- Autoruns plugin for the Volatility framework☆122Jul 18, 2019Updated 6 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆77Oct 29, 2014Updated 11 years ago
- Malware static analysis framework☆185Apr 1, 2020Updated 5 years ago
- Sublime Malware Research Tool☆66Oct 28, 2024Updated last year
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Sep 23, 2014Updated 11 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Mar 8, 2017Updated 8 years ago
- Reverse engineering tool for virtualization wrappers☆145Sep 7, 2023Updated 2 years ago
- Differential Analysis of Malware in Memory☆216Apr 16, 2017Updated 8 years ago
- Collection of scripts that were once useful for reverse engineering things☆75May 8, 2010Updated 15 years ago
- A short and small memory forensics helper.☆52Oct 18, 2017Updated 8 years ago
- Yaras Random☆23Feb 21, 2019Updated 6 years ago
- Wraps around various tools and provides some additional checks/information to produce a centralized report of a PE file.☆208Jan 24, 2014Updated 12 years ago
- Checks with NSRL RDS servers looking for for hash matches☆114Feb 26, 2021Updated 4 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Apr 13, 2015Updated 10 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Sep 12, 2017Updated 8 years ago
- A tool to analyze multi-byte xor cipher☆1,474May 21, 2025Updated 8 months ago
- Hunting IOCs all day every day...☆87Sep 26, 2023Updated 2 years ago
- A warehouse for your malware☆136Nov 21, 2025Updated 2 months ago
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 14 years ago
- Process HTTP Pcaps With YARA☆108Jul 29, 2013Updated 12 years ago
- Network sinkhole for isolated malware analysis☆40Mar 5, 2018Updated 7 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Nov 21, 2017Updated 8 years ago
- PEframe is a open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents.☆619Aug 8, 2022Updated 3 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆171Jul 7, 2018Updated 7 years ago
- A machine learning tool that ranks strings based on their relevance for malware analysis.☆750Jan 22, 2026Updated 3 weeks ago
- Collection of my Python Scripts☆41Aug 14, 2020Updated 5 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- An Open Source Malware Analysis Pipeline System☆157Jun 1, 2021Updated 4 years ago
- *DEPRECATED* Advanced skinning plugin for IDA Pro, ported to x64dbg☆32Nov 23, 2016Updated 9 years ago
- Web App for Volatility framework☆389Jan 13, 2026Updated last month
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆208Mar 12, 2025Updated 11 months ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆191Dec 19, 2015Updated 10 years ago