AdvDebug / BehavEyeLinks
Advanced dynamic malware analysis tool.
☆83Updated last year
Alternatives and similar repositories for BehavEye
Users that are interested in BehavEye are comparing it to the libraries listed below
Sorting:
- The best powershell obfuscator ever made☆109Updated 2 months ago
- Stealer in c++.☆42Updated 2 months ago
- Ransomware written in go, encrypt - decrypt.☆25Updated 2 months ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆41Updated 2 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆35Updated 2 months ago
- ☆118Updated 8 months ago
- simple user-mode Rootkit☆104Updated 2 years ago
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆106Updated this week
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated last year
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆62Updated 4 months ago
- A DLL Injection Detector for Windows☆32Updated last week
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆27Updated 5 years ago
- Cronos Crypter is an simple example of crypter created for educational purposes.☆100Updated 9 months ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆119Updated last month
- LKM rootkit for modern kernels, with DNS C2 and a simple web interface☆69Updated 2 months ago
- Nim process hollowing loader☆57Updated 10 months ago
- Yandex browser passwords and credit-cards decryption algorithm☆15Updated 2 months ago
- Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust☆57Updated last year
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆113Updated 2 months ago
- Configuration Extractors for Malware☆106Updated 2 months ago
- Fud Runpe Av Evasion / All Av Bypass☆33Updated 2 years ago
- Decrypting yandex browser passwords☆21Updated 2 months ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆27Updated 2 years ago
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆23Updated 5 months ago
- Advanced Keylogger / Info Grabber written in C++.☆31Updated 3 months ago
- Implementing the ghostly hollowing PE injection technique using tampered syscalls.☆164Updated 3 months ago
- using the gpu to hide your payload☆59Updated 2 years ago
- A reverse/bind shell generator utility☆10Updated 11 months ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆63Updated 2 months ago
- Windows Syscall SDK with dynamic offset resolution, syscall validation, obfuscation, and more!☆20Updated this week