ulexec / EmotetCFU
WIP Emotet Control Flow Unflattening using miasm and radare2
☆23Updated 2 years ago
Alternatives and similar repositories for EmotetCFU:
Users that are interested in EmotetCFU are comparing it to the libraries listed below
- Go Lang Portable Executable Parser☆39Updated 3 years ago
- ☆66Updated last year
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆39Updated 5 years ago
- A collection of shellcode hashes☆17Updated 6 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆96Updated 4 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- Write-ups for crackmes and CTF challenges☆51Updated 2 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 4 years ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆67Updated 9 months ago
- A modular Karton Framework service that unpacks common packers like UPX and others using the Qiling Framework.☆52Updated 3 years ago
- TrashDBG the world's worse debugger☆23Updated 2 years ago
- ☆28Updated 4 years ago
- Yet another rule generator for Yara☆27Updated 4 years ago
- Helper idapython code for reversing kmdf drivers☆72Updated 2 years ago
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆51Updated 2 years ago
- Capa analysis importer for Ghidra.☆61Updated 4 years ago
- Tools for inspecting YARA bytecode☆15Updated 4 years ago
- ☆31Updated 2 years ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆31Updated 5 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆27Updated 2 years ago
- Winbindex bot to pull in binaries for specific releases☆46Updated last year
- PoC for hiding PE exports☆66Updated 4 years ago
- A collection of empty MSVC projects, compiled using various versions and configurations of Visual Studio.☆31Updated 7 months ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆75Updated 6 months ago
- Write-ups for FireEye's FLARE-On challenges☆25Updated 5 years ago
- Writeups for CTF challenges☆30Updated last year
- An Integrity-Check Monitoring Pintool☆56Updated 4 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- SPI flash read MitM attack PoC☆37Updated 2 years ago
- UnpacMe IDA Byte Search☆27Updated last year