AdvDebug / BehavEyeLinks
Advanced dynamic malware analysis tool.
☆82Updated last year
Alternatives and similar repositories for BehavEye
Users that are interested in BehavEye are comparing it to the libraries listed below
Sorting:
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆41Updated 5 months ago
- The best powershell obfuscator ever made☆112Updated 2 months ago
- The first open source runtime windows batch and command line deobfuscator☆38Updated last month
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆73Updated last year
- using the gpu to hide your payload☆62Updated 3 years ago
- Nim process hollowing loader☆60Updated 2 months ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆40Updated 4 years ago
- AntiRansomware Linux Kernel Module☆37Updated 2 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆57Updated last year
- a small wiper malware programmed in c#☆58Updated 2 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆28Updated last year
- Red Team Operation's Defense Evasion Technique.☆55Updated last year
- Ransomware written in go, encrypt - decrypt.☆30Updated 5 months ago
- simple user-mode Rootkit☆106Updated 2 years ago
- A Bumblebee-inspired Crypter☆78Updated 2 years ago
- A command and control framework.☆55Updated 9 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆54Updated 2 weeks ago
- Troll TaskManager, and play with it .☆27Updated 2 months ago
- ☆37Updated last year
- A dynamic unpacking tool☆141Updated 2 years ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆52Updated last year
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆41Updated last year
- Cronos Crypter is an simple example of crypter created for educational purposes.☆102Updated last year
- Bypass Malware Time Delays☆104Updated 3 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆109Updated 2 years ago
- Comprehensive Windows Syscall Extraction & Analysis Framework☆135Updated last month
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- Unpacker and Config Extractor for managed Redline Stealer payloads☆40Updated 2 years ago
- ☆25Updated 6 months ago