pe-sieve 
 PE scanner
 A tool for detecting and analyzing malicious code in executables
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
3k stars
 103 watching
 441 forks
 
Language: C++ 
last commit: 11 months ago   anti-malwarehookinglibpeconvmalware-analysismemory-forensicspe-analyzerpe-dumperpe-formatpe-sieveprocess-analyzerscans 
 Related projects:
| Repository | Description | Stars | 
|---|---|---|
|    |  Analyzes running processes to detect and dump malicious code | 2,047 | 
|    |  An implementation of a malware injection technique using PE injection to create and control malicious processes | 581 | 
|    |  An implementation of a memory-based PE injection technique for executing payloads in a target process | 521 | 
|    |  A tool to unpack malicious code from packed executables using the PE-sieve technique. | 668 | 
|    |  Converts PE files into executable shellcode | 2,410 | 
|    |  An open-source tool for analyzing and editing PE file formats | 772 | 
|    |  A fast and customizable vulnerability scanner built on a YAML-based DSL. | 21,054 | 
|    |  A C++ library that provides a set of helper functions for loading, manipulating, and dumping PE files. | 1,129 | 
|    |  A tool for detecting vulnerabilities in container images and filesystems | 8,970 | 
|    |  Analyzes PE files by combining data from various tools to generate a centralized report. | 204 | 
|    |  Analyzes Portable Executable malware and malicious MS Office documents for various suspicious features | 612 | 
|    |  Detects and analyzes malicious traffic patterns to identify potential security threats. | 6,642 | 
|    |  Analyzes PE files for security vulnerabilities and suspicious behavior | 1,024 | 
|    |  Generates detailed visibility into software packages and dependencies to manage vulnerabilities and license compliance. | 6,371 |