ulexec / EmotetCFULinks
WIP Emotet Control Flow Unflattening using miasm and radare2
☆23Updated 3 years ago
Alternatives and similar repositories for EmotetCFU
Users that are interested in EmotetCFU are comparing it to the libraries listed below
Sorting:
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- ☆73Updated 2 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Updated 3 years ago
- Capa analysis importer for Ghidra.☆63Updated 5 years ago
- Yet another rule generator for Yara☆29Updated 6 months ago
- IDA Pro plugin for recognizing known hashes of API function names☆82Updated 3 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Updated 6 years ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆71Updated last year
- Write-ups for crackmes and CTF challenges☆54Updated 3 years ago
- TrashDBG the world's worse debugger☆23Updated 3 years ago
- An IDA Pro extension for easier (malware) reverse engineering☆116Updated 3 years ago
- IDA python plugin to scan binary with Yara rules☆180Updated last year
- Tools for inspecting YARA bytecode☆21Updated 5 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆124Updated 5 years ago
- Robust Automated Malware Unpacker☆86Updated 2 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- ☆165Updated 4 years ago
- A collection of shellcode hashes☆17Updated 7 years ago
- ☆28Updated 5 years ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆118Updated 2 years ago
- Malware dynamic instrumentation tool based on frida framework☆110Updated 5 years ago
- pyGoRE - Python library for analyzing Go binaries☆66Updated 3 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 3 years ago
- Writeups for CTF challenges☆34Updated 2 years ago
- ☆21Updated 2 months ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆74Updated last year
- Malware Configuration Extraction Modules☆51Updated 2 years ago
- Helper idapython code for reversing kmdf drivers☆74Updated 3 years ago
- A modular Karton Framework service that unpacks common packers like UPX and others using the Qiling Framework.☆58Updated 4 years ago
- Set of antianalysis techniques found in malware☆133Updated 2 years ago