API functions for Malware Research
☆35Jul 9, 2019Updated 6 years ago
Alternatives and similar repositories for MalwareResearchAPI
Users that are interested in MalwareResearchAPI are comparing it to the libraries listed below
Sorting:
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- SSDT_process_hide_protect☆10Jul 17, 2014Updated 11 years ago
- ☆36Oct 27, 2019Updated 6 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- ☆15Oct 24, 2017Updated 8 years ago
- RC4 Encryption with CryptoAPI and C☆15Apr 6, 2016Updated 9 years ago
- Cheat-Sheet with events too look out for when analysing malicious Office documents☆19Oct 21, 2017Updated 8 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- Execute codes From XSLT☆16Dec 28, 2016Updated 9 years ago
- It's like DocBleach, but in your browser☆18Oct 24, 2019Updated 6 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Nov 24, 2021Updated 4 years ago
- DocBleachShell is the integration of the great DocBleach, https://github.com/docbleach/DocBleach Content Disarm and Reconstruction tool i…☆21Jan 15, 2022Updated 4 years ago
- Tool to decompress data from Windows 10 page files and memory dumps, that has been compressed by the Windows 10 memory manager.☆51Apr 9, 2019Updated 6 years ago
- Here be dragons. Or Slides. Or Papers. Or Nothing :)☆32Feb 5, 2019Updated 7 years ago
- Slides from presentations done by ESET researchers☆20Dec 18, 2015Updated 10 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- ☆23Dec 15, 2022Updated 3 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆185Mar 30, 2019Updated 6 years ago
- Source code of my KeygenMe V7 challenge☆22Jul 19, 2018Updated 7 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆447Oct 26, 2022Updated 3 years ago
- Simple PE packer with RtlCompressBuffer☆21Sep 20, 2015Updated 10 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Jan 10, 2017Updated 9 years ago
- Aggressor Script to launch IE driveby for CVE-2018-4878☆87Feb 10, 2018Updated 8 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Jan 8, 2022Updated 4 years ago
- The place where my HackSys Extreme Vulnerable Driver exploits go.☆25Oct 21, 2018Updated 7 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Aug 25, 2017Updated 8 years ago
- Various tools to track the Mirai botnet☆20Nov 3, 2016Updated 9 years ago
- Hansel - a simple but flexible search for IDA☆26Jul 11, 2019Updated 6 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- My personal Automated Malware Analysis Sandboxes and Services☆24Mar 26, 2017Updated 8 years ago
- ☆24Apr 10, 2024Updated last year
- Reverse Engineering tools, scripts, and general commentary☆59Mar 7, 2019Updated 6 years ago
- Windows Process Injection Toolkit - plain and simple :)☆28Jul 29, 2018Updated 7 years ago
- a collection of public yara rules☆25Oct 30, 2019Updated 6 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- ☆25Jan 26, 2016Updated 10 years ago
- Creates dictionaries based on Wikipedia titles☆63Aug 27, 2019Updated 6 years ago
- Various config files obtained during malware analysis☆67Oct 31, 2018Updated 7 years ago
- Wordlists for Wfuzz or Dirbuster☆26Feb 19, 2016Updated 10 years ago