Demonslay335 / CryptoTesterLinks
A utility for playing with cryptography, geared towards ransomware analysis.
☆313Updated 3 months ago
Alternatives and similar repositories for CryptoTester
Users that are interested in CryptoTester are comparing it to the libraries listed below
Sorting:
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆199Updated 2 months ago
- x64 Dynamic Reverse Engineering Toolkit☆710Updated 2 years ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆569Updated 3 months ago
- A small x64 library to load dll's into memory.☆450Updated 2 years ago
- A dynamic unpacking tool☆143Updated 2 years ago
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆643Updated 2 years ago
- Advanced static analysis tool☆100Updated 2 weeks ago
- Centralized resource for listing and organizing known injection techniques and POCs☆652Updated last month
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆469Updated 4 months ago
- Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls☆381Updated last year
- Patching "signtool.exe" to accept expired certificates for code-signing.☆303Updated last year
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆222Updated 2 years ago
- PoCs for Kernelmode rootkit techniques research.☆420Updated 2 weeks ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆167Updated last year
- Important notes and topics on my journey towards mastering Windows Internals☆416Updated last year
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆257Updated last year
- Now You See Me, Now You Don't☆993Updated this week
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆460Updated 2 years ago
- Cybersecurity research results. Simple C/C++ and Python implementations☆281Updated last week
- An automatic unpacker and logger for DotNet Framework targeting files☆265Updated 2 years ago
- An easily modifiable shellcode template for Windows x64 written in C☆266Updated 2 years ago
- Signtool for expired certificates☆493Updated 2 years ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆496Updated 2 years ago
- A tutorial on how to write a packer for Windows!☆298Updated last year
- PoC Implementation of a fully dynamic call stack spoofer☆857Updated last year
- Shoggoth: Asmjit Based Polymorphic Encryptor☆758Updated last year
- Automated multi-engine framework for unpacking, analyzing, and devirtualizing binaries protected by commercial and custom Virtual Machine…☆282Updated last month
- Vulnerable driver research tool, result and exploit PoCs☆221Updated 2 years ago
- BYOVD research use cases featuring vulnerable driver discovery and reverse engineering methodology. (CVE-2025-52915, CVE-2025-1055,).☆442Updated last month
- Controlling Windows PP(L)s☆356Updated 2 years ago