AdvDebug / BehavEye
Advanced dynamic malware analysis tool.
☆82Updated last year
Alternatives and similar repositories for BehavEye:
Users that are interested in BehavEye are comparing it to the libraries listed below
- Lime Crypter Obfuscator Mod☆27Updated 9 months ago
- It was a great run, but everything must come to an end. Please don’t contact me. Before I go, here’s a final gift :)☆21Updated 3 weeks ago
- Ransomware written in go, encrypt - decrypt.☆20Updated 9 months ago
- ☆105Updated 5 months ago
- simple user-mode Rootkit☆103Updated 2 years ago
- The best powershell obfuscator ever made☆98Updated 2 weeks ago
- Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust☆40Updated 10 months ago
- A continuation of the famous quasar remote administration tool☆110Updated this week
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆28Updated 3 weeks ago
- Advanced Keylogger / Info Grabber written in C++.☆30Updated 3 weeks ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆41Updated 2 years ago
- Nim process hollowing loader☆57Updated 8 months ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆39Updated last month
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆32Updated last year
- Cronos Crypter is an simple example of crypter created for educational purposes.☆98Updated 6 months ago
- ☆31Updated 6 months ago
- LNK-Dropper Builder☆22Updated 2 weeks ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆40Updated 3 weeks ago
- Bypassing windows uac, however its an old approach/method but its still unpatched ¯\_(ツ)_/¯☆45Updated 3 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆29Updated 2 years ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆117Updated 2 months ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆27Updated 2 years ago
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆101Updated this week
- A PowerShell malware that disables all the Windows Security features with UAC Bypass and Anti-VM features. (Designed to work both as a po…☆34Updated 2 weeks ago
- Red Team Operation's Defense Evasion Technique.☆53Updated 10 months ago
- A command and control framework.☆50Updated 3 months ago
- shellcode loader that uses indirect syscalls written in D Lang The loader bypasses user-mode hooks by resolving system calls manually fro…☆9Updated 7 months ago
- Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package.☆50Updated 3 weeks ago
- Bypass Malware Sandbox Evasion Ram check☆137Updated 2 years ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆53Updated last week