AdvDebug / BehavEyeLinks
Advanced dynamic malware analysis tool.
☆84Updated last year
Alternatives and similar repositories for BehavEye
Users that are interested in BehavEye are comparing it to the libraries listed below
Sorting:
- The first open source runtime windows batch and command line deobfuscator☆35Updated last week
- simple user-mode Rootkit☆105Updated 2 years ago
- Ransomware written in go, encrypt - decrypt.☆26Updated 4 months ago
- The best powershell obfuscator ever made☆111Updated 3 weeks ago
- Windows syscall SDK with dynamic offset resolution, validation, obfuscation, and multi language bindings. Bypass API hooks across differe…☆43Updated this week
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆79Updated 6 months ago
- Nim process hollowing loader☆59Updated last month
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆73Updated last year
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 5 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆39Updated 4 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆55Updated 4 months ago
- A dynamic unpacking tool☆140Updated last year
- using the gpu to hide your payload☆59Updated 3 years ago
- Stealthy x64 thread manipulation library for calling functions inside target processes without creating remote threads or installing hook…☆55Updated last week
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆28Updated 11 months ago
- Troll TaskManager, and play with it .☆25Updated 3 weeks ago
- a small wiper malware programmed in c#☆58Updated 2 years ago
- A Repository to Track Anti-Forensic Techniques☆111Updated 2 years ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆42Updated last year
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆57Updated last year
- ☆37Updated last year
- A robust, multiprocessing-capable, multi-family RAT config parser/config extractor for AsyncRAT, DcRAT, VenomRAT, QuasarRAT, XWorm, Xeno …☆50Updated last month
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆134Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆94Updated 3 months ago
- A Bumblebee-inspired Crypter☆79Updated 2 years ago
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆59Updated last year
- Unpacker and Config Extractor for managed Redline Stealer payloads☆42Updated 2 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆48Updated last year
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- ☆44Updated 11 months ago