4n0nym0us / 4n4lDetector
Advanced static analysis tool
☆70Updated 2 weeks ago
Related projects: ⓘ
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆50Updated last week
- A dynamic unpacking tool☆127Updated last year
- The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.☆52Updated 5 months ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆105Updated 2 months ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆63Updated last year
- ☆103Updated last month
- A simple commandline application to automatically decrypt strings from Obfuscator protected binaries☆38Updated 3 months ago
- QLoader is a PE loader creator that helps you quickly create a non-exe loader for application☆98Updated last year
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆72Updated last month
- Privilege escalation using the XAML diagnostics API (CVE-2023-36003)☆90Updated 8 months ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆114Updated last year
- Recon 2023 slides and code☆77Updated last year
- ☆49Updated 10 months ago
- Kernel Mode Driver for Elevating Process Privileges☆129Updated last year
- Bypass Malware Sandbox Evasion Ram check☆134Updated last year
- Process injection via native Windows APIs (NTAPIs)☆15Updated 8 months ago
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆75Updated 2 years ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆51Updated last month
- Identify and exploit leaked handles for local privilege escalation.☆102Updated last year
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆37Updated last month
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆63Updated 4 months ago
- ☆105Updated last year
- Small visualizator for PE files☆66Updated last year
- It's pointy and it hurts!☆120Updated last year
- ☆97Updated last year
- ☆36Updated 7 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆80Updated last year
- A attempt at replicating BLACKLOTUS capabilities, whilst not acting as a direct mimic.☆81Updated last year
- IDA Python scripts☆26Updated 8 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆77Updated 7 months ago