Fadi002 / MalwareInvestigationLinks
reverse engineering random malwares
☆23Updated 4 months ago
Alternatives and similar repositories for MalwareInvestigation
Users that are interested in MalwareInvestigation are comparing it to the libraries listed below
Sorting:
- UAC via computerdefaults.exe☆12Updated 2 months ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆12Updated 4 months ago
- Ransomware written in go, encrypt - decrypt.☆25Updated last month
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆19Updated 2 months ago
- Measures average CPU cycles for the CPUID instruction to detect if the code is running in a VM by comparing against a threshold.☆21Updated 2 months ago
- A simple commandline application to automatically decrypt strings from Obfuscator protected binaries☆46Updated last year
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated last year
- C# API for Nidhogg rootkit☆17Updated last year
- Change hash for a signed pe☆16Updated last year
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆10Updated 2 months ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 3 years ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆12Updated 2 months ago
- NailaoLoader: Hiding Execution Flow via Patching☆21Updated 3 months ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆12Updated 2 months ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆9Updated 2 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 9 months ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated last year
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆27Updated last year
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆15Updated last month
- C# loader capable of running stage-1 from remote url, file path as well as file share☆16Updated 2 years ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆31Updated last year
- Misery Loader to bypass modern EDR solutions☆11Updated 6 months ago
- Standalone Metasploit-like XOR encoder for shellcode☆47Updated last year
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆37Updated last month
- Reports on Driver, LSASS and other security services mitigations☆16Updated 2 months ago
- Parent Process ID Spoofing, coded in CGo.☆22Updated 2 months ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆15Updated last year
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆32Updated last year
- PDF Icon File Type Spoofer☆16Updated 11 months ago