DotNetHooker
.NET debugger
Tools for tracing and analyzing .NET function calls and argument dumps to aid in reverse engineering malware.
5 stars
2 watching
1 forks
Language: C++
last commit: almost 4 years ago Related projects:
| Repository | Description | Stars |
|---|---|---|
| | An automated tool for analyzing .NET-based malware samples by logging function calls and dumping memory segments. | 250 |
| | An extension for VSCode that enables building, debugging, and deployment of .NET apps on multiple platforms. | 282 |
| | Deobfuscation tool for .NET patching applications | 24 |
| | A collection of .NET Core extensions and helper packages to simplify development | 725 |
| | A .Net wrapper library for the native Yara library to quickly identify and classify malware samples. | 38 |
| | A proof-of-concept tool designed to generate malware traffic for security incident detection and analysis. | 17 |
| | Decompiles binary code from various architectures into human-readable assembly code | 765 |
| | A C# wrapper for the 7z.dll archiver library | 312 |
| | A Go wrapper around the .NET Core Runtime | 483 |
| | Analyzes .NET code for style, quality and maintainability issues | 1,598 |
| | A debugging and development tool for ProcessWire CMF/CMS | 88 |
| | Scans .NET Core applications for known vulnerabilities in runtimes. | 178 |
| | A command line interface for creating and managing interactive programming questions and prompts | 2 |
| | A tool for monitoring and testing asyncio programs | 63 |
| | An extension to the official Selenium .NET webdriver with Appium-specific methods | 384 |