AdvDebug / BehavEyeLinks
Advanced dynamic malware analysis tool.
☆82Updated last year
Alternatives and similar repositories for BehavEye
Users that are interested in BehavEye are comparing it to the libraries listed below
Sorting:
- The first open source runtime windows batch and command line deobfuscator☆41Updated 4 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Updated 8 months ago
- Nim process hollowing loader☆62Updated 5 months ago
- Ransomware written in go, encrypt - decrypt.☆30Updated 8 months ago
- The best powershell obfuscator ever made☆120Updated 5 months ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆74Updated last year
- using the gpu to hide your payload☆63Updated 3 years ago
- a small wiper malware programmed in c#☆59Updated 3 years ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆34Updated 2 years ago
- simple user-mode Rootkit☆107Updated 3 years ago
- C2 writen in Rust & Go powered by Tor network.☆151Updated 2 months ago
- Troll TaskManager, and play with it .☆29Updated 4 months ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆58Updated 2 years ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆43Updated last year
- Red Team Operation's Defense Evasion Technique.☆56Updated last year
- Bypass Malware Time Delays☆108Updated 3 years ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆34Updated 3 years ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆57Updated 3 months ago
- A slightly more fun way to disable windows defender☆50Updated 7 months ago
- ☆43Updated last year
- A Bumblebee-inspired Crypter☆79Updated 3 years ago
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆63Updated 2 years ago
- Create and enumerate hidden desktops.☆88Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆118Updated 3 weeks ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 6 years ago
- Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust☆78Updated last year
- A dynamic unpacking tool☆145Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated 2 years ago
- Stealthy x64 thread manipulation library for calling functions inside target processes without creating remote threads or installing hook…☆58Updated 2 months ago