AdvDebug / BehavEye
Advanced dynamic malware analysis tool.
☆69Updated 7 months ago
Related projects: ⓘ
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆67Updated 6 months ago
- VirusTotal Stealer is a DATA Exfiltration tool that exfitrate office documents and tunnel them over VirusTotal API to the Team Server☆62Updated 11 months ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Updated 9 months ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆31Updated 11 months ago
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆44Updated last year
- A feed of malware samples curated from threat intelligence sources.☆25Updated 11 months ago
- ☆55Updated this week
- Unpacker and Config Extractor for managed Redline Stealer payloads☆36Updated last year
- ☆42Updated this week
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆83Updated 11 months ago
- ☆23Updated 4 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆45Updated 2 months ago
- a small wiper malware programmed in c#☆43Updated last year
- Deleting Shadow Copies In Pure C++☆111Updated last year
- Ransomware written in go, encrypt - decrypt.☆15Updated 2 months ago
- Go ransomware utilising ChaCha20 and ECIES encryption.☆52Updated last month
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆121Updated last year
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆23Updated 5 months ago
- Nim process hollowing loader☆47Updated last month
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated last year
- AntiRansomware Linux Kernel Module☆37Updated last year
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆77Updated 7 months ago
- Create and enumerate hidden desktops.☆86Updated 9 months ago
- Windows Thread Pool Injection Havoc Implementation☆26Updated 5 months ago
- using the gpu to hide your payload☆47Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆72Updated 10 months ago
- This repository is a tool to create a .suo that when run by visual studio's will achieve code execution☆94Updated 10 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆51Updated last month
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆43Updated 4 months ago