D4stiny / PeaceMaker
PeaceMaker Threat Detection is a Windows kernel-based application that detects advanced techniques used by malware.
☆411Updated 4 years ago
Related projects: ⓘ
- Live hunting of code injection techniques☆368Updated 5 years ago
- Extract Windows Defender database from vdm files and unpack it☆419Updated 4 years ago
- A memory scanning evasion technique☆825Updated 7 years ago
- Expriments☆438Updated 4 months ago
- ☆531Updated this week
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆577Updated 2 years ago
- Universal Unhooking☆312Updated 6 years ago
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆678Updated 4 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆376Updated 2 months ago
- A Binary Genetic Traits Lexer Framework☆385Updated 9 months ago
- Tools for instrumenting Windows Defender's mpengine.dll☆271Updated 5 years ago
- Dynamic unpacker based on PE-sieve☆650Updated 6 months ago
- ☆782Updated 4 years ago
- Enumerate and disable common sources of telemetry used by AV/EDR.☆760Updated 3 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆785Updated 2 years ago
- Generating YARA rules based on binary code☆198Updated 2 years ago
- A list of ways to execute code on Windows using legitimate Windows tools☆301Updated 5 years ago
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆659Updated 6 months ago
- Events from all manifest-based and mof-based ETW providers across Windows 10 versions☆261Updated 4 months ago
- Persisting in the Windows registry "invisibly"☆336Updated 6 years ago
- Evade sysmon and windows event logging☆609Updated 4 years ago
- This is a simple example and explanation of obfuscating API resolution via hashing☆224Updated 4 years ago
- A tool to detect and crash Cuckoo Sandbox☆286Updated last month
- Quickly debug shellcode extracted during malware analysis☆547Updated last year
- Research on Anti-malware and other related security solutions☆243Updated 4 years ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆722Updated 2 years ago
- Canadian Furious Beaver is a ProcMon-style tool designed only for capturing IRPs sent to any Windows driver.☆308Updated 5 months ago
- ☆470Updated 6 years ago
- Demos of various (also non standard) persistence methods used by malware☆216Updated last year
- Just another Windows Process Injection☆387Updated 4 years ago