There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Malware-analysis-and-Reverse-engineering
Some of my publicly available Malware analysis and Reverse engineering.EXE-or-DLL-or-ShellCode
Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode...IDA_PHNT_TYPES
Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).ghidra_scripts
sc2pe
Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PEGet-PDInvokeImports
Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke usage in assembly. Showing all locations from where they are referenced and Exports all to DnSpy_Bookmarks.xmlConfuserEx2_String_Decryptor
ConfuserEx2 String Decryptor & Full Deobfuscation GuideInvoke-DetectItEasy
Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.Get-UnJlaive
Get-UnJlaive is tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.CAPA_JsonConver
Converts exported results of CAPA tool from .json format to another formats supporting by different tools.CrackMe-Examples
Some of CrackMes made by me :)tiny_tracer_tag_to_cutter
VoiceC2_POC
Simple POC of Voice C2 using Speech RecognitionPowershell-Tools
Collection of some easy of use tools - in powershell.sc2elf
Simple dotnet Native AOT app that uses LibObjectFile to convert shellcode to ELFMalware_TEMP
Temp files related to MA and REGo_CrackMe
Little Reversing CrackMe written in GOx64dbg---Dark-Theme
Alternative to x64dbg build in dark theme.Love Open Source and this site? Check out how you can help us