AdvDebug / BehavEye
Advanced dynamic malware analysis tool.
☆83Updated last year
Alternatives and similar repositories for BehavEye:
Users that are interested in BehavEye are comparing it to the libraries listed below
- Lime Crypter Obfuscator Mod☆28Updated 10 months ago
- Stealer in c++.☆36Updated last week
- The best powershell obfuscator ever made☆105Updated 2 weeks ago
- Cronos Crypter is an simple example of crypter created for educational purposes.☆98Updated 7 months ago
- Ransomware written in go, encrypt - decrypt.☆20Updated last week
- Advanced Keylogger / Info Grabber written in C++.☆31Updated last month
- simple user-mode Rootkit☆103Updated 2 years ago
- Fud Runpe Av Evasion / All Av Bypass☆33Updated 2 years ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆32Updated last year
- Decrypting yandex browser passwords☆17Updated last month
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆38Updated 2 months ago
- A PowerShell malware that disables all the Windows Security features with UAC Bypass and Anti-VM features. (Designed to work both as a po…☆35Updated last month
- ☆109Updated 6 months ago
- Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust☆48Updated 11 months ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆41Updated 2 years ago
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆103Updated 2 weeks ago
- ☆31Updated 7 months ago
- Nim process hollowing loader☆57Updated 9 months ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆29Updated 2 years ago
- Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package.☆52Updated last week
- CaveCarver - PE backdooring tool which utilizes and automates code cave technique☆225Updated 2 years ago
- T-1 is a shellcode loader that leverages ML techniques to detect VM environments☆25Updated 6 months ago
- ☆35Updated last year
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆41Updated 2 years ago
- A continuation of the famous quasar remote administration tool☆128Updated last week
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆44Updated last year
- Bypass Malware Sandbox Evasion Ram check☆137Updated 2 years ago
- LKM rootkit for modern kernels, with DNS C2 and a simple web interface☆65Updated last month
- ☆34Updated last year
- Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume thread…☆160Updated last year