ExaTrack / Kdrill
Python tool to check rootkits in Windows kernel
☆169Updated last week
Related projects ⓘ
Alternatives and complementary repositories for Kdrill
- A ProcessMonitor visualization application written in rust.☆176Updated last year
- ☆111Updated last week
- Tools for analyzing EDR agents☆209Updated 5 months ago
- ☆181Updated 9 months ago
- ☆153Updated 6 months ago
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆139Updated this week
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆125Updated 4 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆140Updated 2 months ago
- Repository of Yara Rules☆88Updated last month
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆194Updated last year
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆176Updated 3 months ago
- ☆173Updated 3 months ago
- ☆95Updated 2 months ago
- ☆120Updated last year
- An interactive shell to spoof some LOLBins command line☆180Updated 9 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆301Updated last year
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆105Updated last month
- Analyse MSI files for vulnerabilities☆109Updated 2 months ago
- A C# based tool for analysing malicious OneNote documents☆107Updated last year
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆110Updated 4 months ago
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning …☆259Updated last year
- ☆64Updated last year
- A collection of tools, scripts and personal research☆113Updated 4 months ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆325Updated 5 months ago
- ☆105Updated 9 months ago
- ☆147Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 5 months ago
- ☆294Updated 3 weeks ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆248Updated last year