ExaTrack / Kdrill
Python tool to check rootkits in Windows kernel
☆195Updated last month
Alternatives and similar repositories for Kdrill:
Users that are interested in Kdrill are comparing it to the libraries listed below
- A ProcessMonitor visualization application written in rust.☆178Updated last year
- Tools for analyzing EDR agents☆229Updated 10 months ago
- ☆113Updated 2 months ago
- ☆217Updated 2 months ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆310Updated last year
- ☆186Updated last year
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆158Updated 2 weeks ago
- Configuration Extractors for Malware☆97Updated last week
- ☆156Updated 11 months ago
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆208Updated last year
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆123Updated 2 months ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆142Updated 9 months ago
- Collect Windows telemetry for Maldev☆340Updated 2 months ago
- ☆136Updated 2 years ago
- Repository of Yara Rules☆110Updated last week
- ☆66Updated 2 months ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆116Updated 9 months ago
- ☆241Updated 11 months ago
- kernel callback removal (Bypassing EDR Detections)☆160Updated last month
- A C# based tool for analysing malicious OneNote documents☆113Updated 2 years ago
- ☆201Updated 5 months ago
- ☆98Updated 4 months ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆40Updated this week
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆147Updated 7 months ago
- Use YARA rules on Time Travel Debugging traces☆89Updated last year
- ☆298Updated 5 months ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆335Updated 2 months ago
- ☆116Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆124Updated 10 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆199Updated 3 months ago