ufrisk / MemProcFS-plugins
☆54Updated 6 months ago
Alternatives and similar repositories for MemProcFS-plugins:
Users that are interested in MemProcFS-plugins are comparing it to the libraries listed below
- ☆19Updated 2 years ago
- This tool is the result of a reverse engineering process of the Windows service called SysMain. Time to interact with the prefetch files …☆31Updated 4 years ago
- Windows Event Log Knowledge Base☆24Updated 6 months ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆54Updated 3 months ago
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆109Updated 4 years ago
- Scripts to aid analysis of files obfuscated with ScatterBee.☆20Updated 2 years ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆114Updated 2 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- A powershell parser for https://github.com/ufrisk/MemProcFS☆44Updated 3 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆35Updated last year
- MalUnpack companion driver☆98Updated 10 months ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆25Updated 3 years ago
- Small visualizator for PE files☆69Updated last year
- Unpacking and decryption tools for the Emotet malware☆46Updated 3 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- ☆22Updated 7 months ago
- Python wrappers for mal_unpack☆36Updated last year
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆71Updated last year
- Parse Microsoft shim databases☆30Updated 4 months ago
- runsc loads 32/64 bit shellcode (depending on how runsc is compiled) in a way that makes it easy to load in a debugger. This code is base…☆36Updated 2 years ago
- ☆61Updated last year
- ☆73Updated last year
- ☆33Updated 3 years ago
- Use YARA rules on Time Travel Debugging traces☆90Updated last year
- Specialized tool to dump Position Independent Code.☆22Updated 4 years ago
- ☆71Updated last year
- Malware Configuration Extraction Modules☆49Updated last year
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆54Updated 2 years ago
- ☆15Updated 2 years ago
- Rekall Memory Forensic Framework☆32Updated 5 years ago