Bw3ll / sharemLinks
SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also contains its own custom disassembler, with many innovative features, such as being able to show the deobfuscated disassembly of an encoded shellcode, or integrating emulation data to enhance the disassembly.
☆467Updated 4 months ago
Alternatives and similar repositories for sharem
Users that are interested in sharem are comparing it to the libraries listed below
Sorting:
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆198Updated last month
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆166Updated last year
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆407Updated this week
- Vulnerable driver research tool, result and exploit PoCs☆221Updated 2 years ago
- Important notes and topics on my journey towards mastering Windows Internals☆412Updated last year
- PoCs for Kernelmode rootkit techniques research.☆418Updated last week
- A Binary Genetic Traits Lexer Framework☆516Updated 3 months ago
- Assortment of hashing algorithms used in malware☆384Updated 2 weeks ago
- Collect Windows telemetry for Maldev☆435Updated last week
- Exploring RPC interfaces on Windows☆334Updated last year
- PoC Implementation of a fully dynamic call stack spoofer☆852Updated last year
- ☆302Updated 4 years ago
- Sysmon-Like research tool for ETW☆367Updated 2 years ago
- ☆114Updated this week
- Operating System Design Review: A systematic analysis of modern systems architecture☆330Updated 8 months ago
- Yet another variant of Process Hollowing☆422Updated 3 months ago
- Dynamic unpacker based on PE-sieve☆779Updated 2 months ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆660Updated 2 years ago
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆785Updated last year
- Python tool to check rootkits in Windows kernel☆202Updated 2 months ago
- A tutorial on how to write a packer for Windows!☆298Updated last year
- HWSyscalls is a new method to execute indirect syscalls using HWBP, HalosGate and a synthetic trampoline on kernel32 with HWBP.☆701Updated 2 years ago
- FLARE Team's Binary Navigator☆292Updated 3 weeks ago
- Centralized resource for listing and organizing known injection techniques and POCs☆652Updated last month
- Evasion by machine code de-optimization.☆407Updated last year
- A small x64 library to load dll's into memory.☆450Updated 2 years ago
- Extracted Yara rules from Windows Defender mpavbase and mpasbase☆470Updated 3 months ago
- Sleep Obfuscation☆799Updated last year
- Expriments☆475Updated last year
- Useful scripts for WinDbg using the debugger data model☆424Updated last year