Macmod / malkom
Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets of PE and ELF malware samples.
☆16Updated last year
Alternatives and similar repositories for malkom:
Users that are interested in malkom are comparing it to the libraries listed below
- ☆12Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- Extension functionality for the NightHawk operator client☆26Updated last year
- ☆17Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 9 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 7 months ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- Tool for obtaining information about PPL processes☆17Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 3 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆12Updated last year
- A custom SentinelOne USB scanner.☆18Updated 2 years ago
- A collection of my presentation materials.☆16Updated 9 months ago
- ☆18Updated last month
- WMI SA stuffs☆29Updated 2 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆14Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated last year
- just manipulatin these here tokens yes sir nothing weird☆22Updated 2 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 4 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆16Updated last year
- Speaking materials from conferences I've given☆9Updated 2 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 2 years ago