function identification signatures
☆12Apr 26, 2021Updated 4 years ago
Alternatives and similar repositories for siglib
Users that are interested in siglib are comparing it to the libraries listed below
Sorting:
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- Ida Pro plugin to aid in reverse engineering Rust binaries.☆19Dec 9, 2024Updated last year
- Go Lang Portable Executable Parser☆39Mar 31, 2021Updated 4 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- Emulation Wrapper Solution is a IDA Pro plugin that brings emulator capacities to provide features such as debugging an mocking.☆23May 25, 2023Updated 2 years ago
- x64dbg plugin to log executions☆16Aug 28, 2023Updated 2 years ago
- Reverse engineered API for Microsoft's Time Travel Debugger☆36Apr 18, 2024Updated last year
- Can you pay the ransom in your country?☆14Dec 18, 2023Updated 2 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- A simple IDA Pro plugin to show all HexRays decompiler comments written by user☆23Sep 3, 2021Updated 4 years ago
- x64dbg Malware Plugin. Detect malicious materials☆16Jun 13, 2020Updated 5 years ago
- ☆17Feb 23, 2023Updated 3 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- HideToolz 2.2 w/ support Windows 7 (7601) http://fyyre.ru/vault/hidetoolz.7z☆14Apr 14, 2021Updated 4 years ago
- LLVM based devirtualization PoC’s.☆21Dec 11, 2021Updated 4 years ago
- ☆23May 24, 2024Updated last year
- Import DynamoRIO drcov code coverage data into Ghidra☆44Dec 21, 2023Updated 2 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 8 months ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Oct 9, 2015Updated 10 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated 2 months ago
- An IDA plugin to deobfuscate Pikabot's strings using RC4 and AES☆13Apr 8, 2024Updated last year
- This is a set of C libraries designed to provide all of the nice-to-have features of more modern and full-featured languages, but targete…☆13Mar 9, 2024Updated 2 years ago
- Notes some analysis related to VidarStealer sample☆16May 5, 2024Updated last year
- x64dbg conditional branches logger [Plugin]☆72Mar 20, 2017Updated 9 years ago
- An Integrity-Check Monitoring Pintool☆58Nov 2, 2020Updated 5 years ago
- swffile.py - SWF file parser module in Python☆28Apr 4, 2016Updated 9 years ago
- An active domain name query tool to help keep track of domain name movements...☆16Mar 28, 2021Updated 4 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- ☆26Jun 30, 2021Updated 4 years ago
- 带有代码分析器的混乱虚拟机保护引擎☆14Jul 10, 2020Updated 5 years ago
- IDA plugin to deobfuscate emotet CFF☆18Apr 26, 2022Updated 3 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- ☆25Jan 8, 2024Updated 2 years ago
- Simply carrying your cell/modile phone can be enough to locate you. Greatly inspired byt the New York Times Article Twelve Million Phones…☆24Jan 7, 2023Updated 3 years ago
- A python script that can detect and parse loki-bot (malware) related network traffic. This script can be helpful to DFIR analysts and sec…☆13Dec 31, 2021Updated 4 years ago
- Simple tool to dump/hide services in services.exe process.☆14Apr 22, 2022Updated 3 years ago
- Code snippets for Qiling Tutorials☆21Aug 22, 2020Updated 5 years ago
- Humane API for storing and accessing persistent data in IDA Pro databases☆84Jul 1, 2020Updated 5 years ago