Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.
☆75Mar 7, 2021Updated 5 years ago
Alternatives and similar repositories for sentello
Users that are interested in sentello are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆29May 1, 2020Updated 5 years ago
- Malware vulnerability research. Coming soon..☆12Apr 20, 2020Updated 5 years ago
- Bypass Antivm and Cuckoo Sandbox Techniques☆12Oct 12, 2016Updated 9 years ago
- Winsock accept() Backdoor Implant.☆118Feb 13, 2021Updated 5 years ago
- A tool pulls loaded binaries ordered by memory regions☆35Sep 27, 2019Updated 6 years ago
- A tool designed to make physical devices detectable by malware and make system look like virtual machine.☆397Sep 13, 2020Updated 5 years ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- qiling framework examples☆16Jan 17, 2022Updated 4 years ago
- ☆44Sep 22, 2022Updated 3 years ago
- ☆19Mar 31, 2022Updated 3 years ago
- Heroes of newerth scripting pack☆18Jan 21, 2023Updated 3 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Mar 11, 2021Updated 5 years ago
- Collection of Jupyter notebooks☆14Mar 11, 2021Updated 5 years ago
- This is a project to receive Base64 data and decode it in process☆15Mar 16, 2020Updated 6 years ago
- X86_64 Assembly'a merhaba deyin!☆44Aug 17, 2019Updated 6 years ago
- ☆14Apr 29, 2020Updated 5 years ago
- ABUSING WINDOWS TELEMETRY FOR PERSISTENCE☆140Jul 2, 2020Updated 5 years ago
- Various scripts for different malware families☆106Apr 12, 2021Updated 4 years ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆22Feb 20, 2021Updated 5 years ago
- Simple EDR implementation to demonstrate bypass☆181May 27, 2020Updated 5 years ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Jun 9, 2021Updated 4 years ago
- (kinda) Malicious Outlook Reader☆138Mar 3, 2021Updated 5 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆94May 15, 2021Updated 4 years ago
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- This repository contains indicators of compromise (IOCs) of our various investigations.☆316Nov 4, 2025Updated 4 months ago
- ☆57Mar 19, 2023Updated 3 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆756Nov 16, 2021Updated 4 years ago
- Meetuplardan arta kalanlar☆42Aug 18, 2025Updated 7 months ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Jun 14, 2021Updated 4 years ago
- A tool for injecting 64-bit executables into legitimate processes. Users can specify a local file or download one from a URL, with all op…☆210Oct 23, 2024Updated last year
- Redteam, Pentest, APT's, Blogs, Talks, Slides links and notes☆27May 25, 2022Updated 3 years ago
- Loader and RunPE file executer☆18Jun 12, 2019Updated 6 years ago
- PoC for hiding PE exports☆67Dec 19, 2020Updated 5 years ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Notes for Assembly language☆15Jul 28, 2020Updated 5 years ago
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆88Apr 20, 2021Updated 4 years ago
- A simple program to hook the current process to identify the manual syscall executions on windows☆266Nov 18, 2022Updated 3 years ago
- a repo of links to useful writeups of pwn challenges☆31Jul 22, 2018Updated 7 years ago