triage-collector is a triage collection tool for fast forensic.
https://github.com/herosi/triage-collector
https://github.com/herosi/triage-collector
GitHub
GitHub - herosi/triage-collector
Contribute to herosi/triage-collector development by creating an account on GitHub.
VMUnprotect.Dumper can dynamically untamper VMProtected Assembly
https://github.com/void-stack/VMUnprotect.Dumper
https://github.com/void-stack/VMUnprotect.Dumper
GitHub
GitHub - void-stack/VMUnprotect.Dumper: VMUnprotect.Dumper can dynamically untamper VMProtected Assembly.
VMUnprotect.Dumper can dynamically untamper VMProtected Assembly. - void-stack/VMUnprotect.Dumper
a suite of utilities and libraries that enables analysis of binary programs. BAP supports x86, x86-64, ARM, MIPS, PowerPC and new architectures can be added using plugins. BAP includes various analyses, standard interpreter, microexecution interpreter, and a symbolic executor.
https://github.com/BinaryAnalysisPlatform/bap?s=09
https://github.com/BinaryAnalysisPlatform/bap?s=09
GitHub
GitHub - BinaryAnalysisPlatform/bap: Binary Analysis Platform
Binary Analysis Platform. Contribute to BinaryAnalysisPlatform/bap development by creating an account on GitHub.
Unofficial YARA IDA Pro plugin, along with an unparalleled crypto/hash/compression rule set based on Luigi Auriemma's signsrch signatures.
https://github.com/kweatherman/yara4ida
Взамен устаревшего Signsearch плагина
https://github.com/kweatherman/yara4ida
Взамен устаревшего Signsearch плагина
GitHub
GitHub - kweatherman/yara4ida: Unofficial YARA IDA Pro plugin, along with an unparalleled crypto/hash/compression rule set based…
Unofficial YARA IDA Pro plugin, along with an unparalleled crypto/hash/compression rule set based on Luigi Auriemma's signsrch signatures. - kweatherman/yara4ida
An introduction to reverse engineering .NET AOT applications
https://harfanglab.io/en/insidethelab/reverse-engineering-ida-pro-aot-net/
https://harfanglab.io/en/insidethelab/reverse-engineering-ida-pro-aot-net/
LLVM обфускатор
LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.
https://github.com/janoglezcampos/llvm-yx-callobfuscator
LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.
https://github.com/janoglezcampos/llvm-yx-callobfuscator
GitHub
GitHub - janoglezcampos/llvm-yx-callobfuscator: LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows…
LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time. - janoglezcampos/llvm-yx-callobfuscator
Дамп памяти процесса (apk, ios ipa, ...) фридой
https://github.com/Nightbringer21/fridump
Пример:
https://medium.com/@prnz_offl/dumping-android-application-memory-with-fridump-7adf2ca48fa3
https://github.com/Nightbringer21/fridump
Пример:
https://medium.com/@prnz_offl/dumping-android-application-memory-with-fridump-7adf2ca48fa3
GitHub
GitHub - Nightbringer21/fridump: A universal memory dumper using Frida
A universal memory dumper using Frida. Contribute to Nightbringer21/fridump development by creating an account on GitHub.
Frida cкрипт, позволяет расшифровывать schannel TLS трафик (IIS, RDP, IE, Outlook, Powershell,LDAP,...) (проверил, работает на Windows 11. На Win7 не работает)
https://github.com/ngo/win-frida-scripts/tree/master/lsasslkeylog-easy
Статья:
Decrypting Schannel TLS traffic. Part 1. Getting secrets from lsass
https://github.com/ngo/win-frida-scripts/tree/master/lsasslkeylog-easy
Статья:
Decrypting Schannel TLS traffic. Part 1. Getting secrets from lsass
What Every Malware Analyst Should Know About PE Relocations
http://malwareid.in/unpack/unpacking-basics/pe-relocation-table
http://malwareid.in/unpack/unpacking-basics/pe-relocation-table
MalwareID Unpacking Guide
PE relocation Table
The Portable Executable (PE) base relocation table is crucial in Windows executable files. It handles memory addresses for functions and data, making sure the program runs well no matter where it's loaded in memory.
Linux Kernel GSM Multiplexing Race Condition Local Privilege Escalation Vulnerability (CVE-2023-6546)
https://github.com/Nassim-Asrir/ZDI-24-020/
https://github.com/Nassim-Asrir/ZDI-24-020/
GitHub
GitHub - zerozenxlabs/ZDI-24-020
Contribute to zerozenxlabs/ZDI-24-020 development by creating an account on GitHub.