Bw3ll / sharemLinks
SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also contains its own custom disassembler, with many innovative features, such as being able to show the deobfuscated disassembly of an encoded shellcode, or integrating emulation data to enhance the disassembly.
☆420Updated 3 months ago
Alternatives and similar repositories for sharem
Users that are interested in sharem are comparing it to the libraries listed below
Sorting:
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆192Updated 2 weeks ago
- Important notes and topics on my journey towards mastering Windows Internals☆409Updated last year
- Exploring RPC interfaces on Windows☆330Updated last year
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆774Updated last year
- Vulnerable driver research tool, result and exploit PoCs☆217Updated last year
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆163Updated last year
- Sysmon-Like research tool for ETW☆365Updated 2 years ago
- A Binary Genetic Traits Lexer Framework☆516Updated last month
- ☆300Updated 4 years ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆402Updated last week
- Yet another variant of Process Hollowing☆419Updated 2 months ago
- PoCs for Kernelmode rootkit techniques research.☆406Updated 3 weeks ago
- Operating System Design Review: A systematic analysis of modern systems architecture☆324Updated 7 months ago
- A tutorial on how to write a packer for Windows!☆292Updated last year
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆658Updated 2 years ago
- Collect Windows telemetry for Maldev☆421Updated last week
- Expriments☆468Updated last year
- HWSyscalls is a new method to execute indirect syscalls using HWBP, HalosGate and a synthetic trampoline on kernel32 with HWBP.☆693Updated 2 years ago
- Tools and PoCs for Windows syscall investigation.☆362Updated 3 months ago
- Assortment of hashing algorithms used in malware☆379Updated last month
- Python tool to check rootkits in Windows kernel☆201Updated last month
- A small x64 library to load dll's into memory.☆450Updated last year
- Dynamic unpacker based on PE-sieve☆768Updated 2 weeks ago
- PoC Implementation of a fully dynamic call stack spoofer☆840Updated last year
- FLARE Team's Binary Navigator☆280Updated 2 months ago
- ☆113Updated 2 months ago
- ☆492Updated 3 years ago
- Aims to identify sleeping beacons☆630Updated 9 months ago
- Useful scripts for WinDbg using the debugger data model☆421Updated last year
- Enumerating and removing kernel callbacks using signed vulnerable drivers☆581Updated 2 years ago