AdvDebug / BehavEye
Advanced dynamic malware analysis tool.
☆78Updated last year
Alternatives and similar repositories for BehavEye:
Users that are interested in BehavEye are comparing it to the libraries listed below
- Sryxen aka ThunderKitty.☆30Updated 2 weeks ago
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆53Updated last year
- Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust☆35Updated 8 months ago
- A reverse/bind shell generator utility☆10Updated 7 months ago
- user-mode Rootkit☆103Updated 2 years ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated 11 months ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆40Updated 2 years ago
- A command and control framework.☆46Updated last month
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆102Updated this week
- Nim process hollowing loader☆55Updated 6 months ago
- ☆33Updated 9 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆43Updated 11 months ago
- LKM rootkit for modern kernels, with DNS C2 and a simple web interface☆64Updated this week
- Lime Crypter Obfuscator Mod☆26Updated 7 months ago
- ☆96Updated 4 months ago
- using the gpu to hide your payload☆54Updated 2 years ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆32Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆46Updated 9 months ago
- A feed of malware samples curated from threat intelligence sources.☆25Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆109Updated last year
- Cronos Crypter is an simple example of crypter created for educational purposes.☆95Updated 5 months ago
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆100Updated last month
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆26Updated 5 months ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆21Updated 2 years ago
- Bypass Malware Sandbox Evasion Ram check☆136Updated 2 years ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆55Updated 7 months ago
- RegStrike is a .reg payload generator☆58Updated last year
- ☆30Updated 10 months ago