DotNetHooker
.NET debugger
Tools for tracing and analyzing .NET function calls and argument dumps to aid in reverse engineering malware.
5 stars
2 watching
1 forks
Language: C++
last commit: about 3 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| An automated tool for analyzing .NET-based malware samples by logging function calls and dumping memory segments. | 250 |
| An extension for VSCode that enables building, debugging, and deployment of .NET apps on multiple platforms. | 282 |
| Deobfuscation tool for .NET patching applications | 24 |
| A collection of .NET Core extensions and helper packages to simplify development | 725 |
| A .Net wrapper library for the native Yara library to quickly identify and classify malware samples. | 38 |
| A proof-of-concept tool designed to generate malware traffic for security incident detection and analysis. | 17 |
| Decompiles binary code from various architectures into human-readable assembly code | 765 |
| A C# wrapper for the 7z.dll archiver library | 312 |
| A Go wrapper around the .NET Core Runtime | 483 |
| Analyzes .NET code for style, quality and maintainability issues | 1,598 |
| A debugging and development tool for ProcessWire CMF/CMS | 88 |
| Scans .NET Core applications for known vulnerabilities in runtimes. | 178 |
| A command line interface for creating and managing interactive programming questions and prompts | 2 |
| A tool for monitoring and testing asyncio programs | 63 |
| An extension to the official Selenium .NET webdriver with Appium-specific methods | 384 |