Karneades / awesome-malware-persistence
A curated list of awesome malware persistence tools and resources.
☆206Updated 3 months ago
Alternatives and similar repositories for awesome-malware-persistence:
Users that are interested in awesome-malware-persistence are comparing it to the libraries listed below
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆177Updated 2 months ago
- My collection of malware dev links☆260Updated 6 months ago
- A curated list of awesome Memory Forensics for DFIR☆408Updated last month
- Analyse your malware to surgically obfuscate it☆456Updated last month
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆170Updated last week
- ☆342Updated last year
- ☆158Updated last year
- AV/EDR Lab environment setup references to help in Malware development☆369Updated last month
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆158Updated last month
- Centralized resource for listing and organizing known injection techniques and POCs☆243Updated 4 months ago
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆473Updated last year
- This is a repository of resource about Malware techniques☆786Updated last year
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆289Updated this week
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆655Updated 2 weeks ago
- Python tool to check rootkits in Windows kernel☆195Updated 3 weeks ago
- Repository of Yara Rules☆103Updated last month
- A ProcessMonitor visualization application written in rust.☆177Updated last year
- Gets updates from various clearnet domains and ransomware threat actor domains☆385Updated 11 months ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆653Updated last year
- Awesome list of keywords and artifacts for Threat Hunting sessions☆553Updated 3 weeks ago
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆330Updated 7 months ago
- Important notes and topics on my journey towards mastering Windows Internals☆368Updated 10 months ago
- A list of useful tools for Malware Analysis (will be updated regularly)☆140Updated 6 months ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆374Updated 7 months ago
- Collection of resources that are made by the Malware Research community☆223Updated last year
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆367Updated 3 months ago
- Just some lists of Malware Configs☆169Updated 2 months ago
- This repository contains indicators of compromise (IOCs) of our various investigations.☆245Updated this week
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆387Updated last week
- collection of apis used in malware development☆224Updated 2 years ago