you0708 / lznt1Links
Python implementation of LZNT1 compression/decompression
☆70Updated 5 years ago
Alternatives and similar repositories for lznt1
Users that are interested in lznt1 are comparing it to the libraries listed below
Sorting:
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆124Updated 5 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Updated 4 years ago
- Enumerate Windows Defender threat families and dump their names according category☆93Updated 6 years ago
- pyGoRE - Python library for analyzing Go binaries☆66Updated 3 years ago
- ☆23Updated 4 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆77Updated 11 years ago
- ☆73Updated 2 years ago
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆86Updated 3 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 7 years ago
- CAPE monitor DLLs☆41Updated 6 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 6 years ago
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- Rekall Memory Forensic Framework☆33Updated 6 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆92Updated 6 years ago
- A collection of empty MSVC projects, compiled using various versions and configurations of Visual Studio.☆33Updated last year
- FLARE Kernel Shellcode Loader☆178Updated 6 years ago
- ☆116Updated 9 years ago
- A git history of Windows filesystems☆76Updated 5 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- Simple 32/64-bit PEs loader.☆139Updated 7 years ago
- A utility to fix intentionally corrupted UPX packed files.☆93Updated 2 years ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆117Updated 9 years ago
- Flare-On solutions☆37Updated 6 years ago
- A simple API monitor for Windbg☆65Updated 8 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Updated 6 years ago
- ☆34Updated 4 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆92Updated 7 years ago
- IDA Pro plugin that changes color of call instructions and works with all architectures☆59Updated 7 years ago
- Automatically rebuild Import Address Table for dumped PE file. With python bindings!☆121Updated 7 years ago
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆184Updated 5 years ago