volexity / GoResolverLinks
GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the function symbols of an obfuscated Go binary.
☆64Updated last month
Alternatives and similar repositories for GoResolver
Users that are interested in GoResolver are comparing it to the libraries listed below
Sorting:
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆116Updated 10 months ago
- Configuration Extractors for Malware☆106Updated last month
- Powershell Linter☆53Updated last month
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆83Updated last year
- ☆114Updated last month
- Malware Analysis tools☆26Updated 8 months ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆114Updated 2 years ago
- Retrieve inner payloads from Donut samples☆98Updated last year
- ☆158Updated last month
- Binary Ninja plugin to deobfuscate strings obfuscated with the Garble project☆24Updated 3 months ago
- Use YARA rules on Time Travel Debugging traces☆90Updated last year
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆36Updated 3 months ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆144Updated 10 months ago
- ☆52Updated 7 months ago
- A collection of modules and scripts to help with analyzing Nim binaries☆73Updated 7 months ago
- Golang bindings for PE-sieve☆43Updated last year
- Windows Persistence IT-Security☆99Updated 2 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆79Updated 9 months ago
- IDA Pro plugin to aid with the analysis of native IIS modules☆18Updated 10 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆61Updated 5 months ago
- Repository of Yara Rules☆111Updated last month
- ☆100Updated 6 months ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆78Updated this week
- ETW based POC to identify direct and indirect syscalls☆186Updated 2 years ago
- Elastic Security Labs releases☆67Updated 2 weeks ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆55Updated last week
- Python tool to check rootkits in Windows kernel☆196Updated 3 months ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆53Updated 5 months ago
- Yara Rules for Modern Malware☆77Updated last year
- Tools for analyzing EDR agents☆228Updated 11 months ago