Karneades / awesome-malware-persistenceLinks
A curated list of awesome malware persistence tools and resources.
☆229Updated last week
Alternatives and similar repositories for awesome-malware-persistence
Users that are interested in awesome-malware-persistence are comparing it to the libraries listed below
Sorting:
- Collection of resources that are made by the Malware Research community☆227Updated 2 years ago
- ☆369Updated this week
- My collection of malware dev links☆279Updated last month
- Gets updates from various clearnet domains and ransomware threat actor domains☆398Updated last year
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆187Updated last week
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆188Updated 4 months ago
- This is a repository of resource about Malware techniques☆802Updated 2 years ago
- ☆68Updated 3 years ago
- A curated list of awesome Memory Forensics for DFIR☆464Updated 4 months ago
- collection of apis used in malware development☆224Updated 2 years ago
- Just another collection of links, tools, reports and other stuff☆25Updated 4 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆179Updated last week
- Analyse your malware to surgically obfuscate it☆483Updated last month
- Cybersecurity research results. Simple C/C++ and Python implementations☆245Updated last week
- Centralized resource for listing and organizing known injection techniques and POCs☆588Updated last month
- Just some lists of Malware Configs☆171Updated 6 months ago
- Bringing you the best of the worst files on the Internet.☆335Updated 4 years ago
- A ProcessMonitor visualization application written in rust.☆181Updated last year
- A PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to …☆300Updated last week
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆421Updated last year
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆165Updated 3 months ago
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆364Updated 11 months ago
- Repository of Yara Rules☆112Updated 3 months ago
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆300Updated 2 months ago
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆368Updated 2 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆57Updated last year
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆379Updated 11 months ago
- Python tool to check rootkits in Windows kernel☆197Updated 4 months ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆674Updated last month
- A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analys…☆369Updated 5 months ago