Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!
☆82Jun 28, 2023Updated 2 years ago
Alternatives and similar repositories for dynmx
Users that are interested in dynmx are comparing it to the libraries listed below
Sorting:
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 5 months ago
- Memory Scaner☆65Sep 9, 2022Updated 3 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆60Dec 15, 2023Updated 2 years ago
- Reasonably undetected shellcode stager and executer.☆36May 23, 2025Updated 9 months ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆131Nov 25, 2023Updated 2 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆128Dec 23, 2025Updated 2 months ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆131Nov 5, 2024Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- Repo containing my public talks☆23May 30, 2023Updated 2 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- Manage attack surface data on Elasticsearch☆24Nov 20, 2023Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Nov 12, 2023Updated 2 years ago
- A post-processing script for TinyTracer☆39Mar 22, 2023Updated 2 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Powershell script to help Speed up Threat hunting incident response processes☆43Feb 3, 2024Updated 2 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆233Feb 13, 2024Updated 2 years ago
- ☆38Apr 7, 2023Updated 2 years ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆201Jan 4, 2024Updated 2 years ago
- Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of the …☆355Updated this week
- Parse .NET executable files.☆85Jan 31, 2026Updated last month
- A dynamic unpacking tool☆147Sep 17, 2023Updated 2 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆18Nov 26, 2025Updated 3 months ago
- ☆215Dec 2, 2025Updated 3 months ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- Massayo is a small proof-of-concept Rust library which removes AV/EDR hooks in a given system DLL☆64Sep 12, 2022Updated 3 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆59Apr 16, 2024Updated last year
- Timestomp Tool to flatten MAC times with a specific timestamp☆50Dec 7, 2025Updated 2 months ago
- ☆18Jun 8, 2018Updated 7 years ago
- Duplicate not owned Token from Running Process☆74Jul 21, 2023Updated 2 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 2 months ago