AdvDebug / BehavEyeLinks
Advanced dynamic malware analysis tool.
☆84Updated last year
Alternatives and similar repositories for BehavEye
Users that are interested in BehavEye are comparing it to the libraries listed below
Sorting:
- The first open source runtime windows batch and command line deobfuscator☆37Updated last month
- The best powershell obfuscator ever made☆112Updated last month
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆41Updated 4 months ago
- Nim process hollowing loader☆59Updated last month
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆73Updated last year
- simple user-mode Rootkit☆105Updated 2 years ago
- Ransomware written in go, encrypt - decrypt.☆28Updated 4 months ago
- using the gpu to hide your payload☆59Updated 3 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆31Updated 5 years ago
- A dynamic unpacking tool☆140Updated 2 years ago
- Windows syscall SDK with dynamic offset resolution, validation, obfuscation, and multi language bindings. Bypass API hooks across differe…☆47Updated this week
- Unpacker and Config Extractor for managed Redline Stealer payloads☆42Updated 2 years ago
- a small wiper malware programmed in c#☆58Updated 2 years ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆55Updated 5 months ago
- Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust☆64Updated last year
- ☆45Updated 11 months ago
- Bypass Malware Time Delays☆103Updated 2 years ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆34Updated last year
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆82Updated 7 months ago
- A Bumblebee-inspired Crypter☆79Updated 2 years ago
- ☆37Updated last year
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆42Updated 11 months ago
- A DLL Injection Detector for Windows☆66Updated 2 weeks ago
- LKM rootkit for modern kernels, with DNS C2 and a simple web interface☆74Updated 2 months ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆59Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆43Updated last year
- Cronos Crypter is an simple example of crypter created for educational purposes.☆102Updated last year
- Standalone Metasploit-like XOR encoder for shellcode☆49Updated last year
- ☆41Updated last year