Karneades / awesome-malware-persistenceLinks
A curated list of awesome malware persistence tools and resources.
☆255Updated 3 weeks ago
Alternatives and similar repositories for awesome-malware-persistence
Users that are interested in awesome-malware-persistence are comparing it to the libraries listed below
Sorting:
- ☆69Updated 4 years ago
- This is a repository of resource about Malware techniques☆810Updated 2 years ago
- A curated list of awesome malware analysis tools and resources☆112Updated 3 years ago
- Cybersecurity research results. Simple C/C++ and Python implementations☆270Updated last week
- My collection of malware dev links☆294Updated 4 months ago
- ☆376Updated this week
- Collection of resources that are made by the Malware Research community☆234Updated 2 years ago
- Centralized resource for listing and organizing known injection techniques and POCs☆646Updated last month
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆200Updated 3 months ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆182Updated 3 weeks ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆203Updated last week
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆927Updated last year
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆490Updated last year
- Gets updates from various clearnet domains and ransomware threat actor domains☆406Updated last year
- Just another collection of links, tools, reports and other stuff☆24Updated 4 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆433Updated last year
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆198Updated last month
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆311Updated last month
- Important notes and topics on my journey towards mastering Windows Internals☆409Updated last year
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆715Updated 5 months ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆311Updated last year
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆387Updated last year
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆670Updated last year
- Just some lists of Malware Configs☆172Updated 9 months ago
- A curated list of awesome Memory Forensics for DFIR☆496Updated 8 months ago
- collection of apis used in malware development☆228Updated 3 years ago
- Analyse your malware to surgically obfuscate it☆502Updated 5 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆58Updated 2 months ago
- Different learning materials☆228Updated last month
- ☆371Updated 2 years ago