Malwation / sentello
Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.
☆73Updated 3 years ago
Alternatives and similar repositories for sentello:
Users that are interested in sentello are comparing it to the libraries listed below
- A small utility to deal with malware embedded hashes.☆49Updated last year
- Unpacking and decryption tools for the Emotet malware☆46Updated 3 years ago
- Winsock accept() Backdoor Implant.☆112Updated 4 years ago
- Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.☆71Updated last year
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆105Updated last week
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆127Updated last year
- A curated list of awesome Windows Exploitation resources, and shiny things.☆72Updated 7 years ago
- ☆22Updated 8 months ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- TrashDBG the world's worse debugger☆23Updated 2 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆68Updated 2 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆43Updated last year
- Recreating and reviewing the Windows persistence methods☆37Updated 3 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆74Updated 3 years ago
- Small visualizator for PE files☆67Updated last year
- API Logger for Windows Executables☆78Updated 4 years ago
- Malware Configuration Extraction Modules☆48Updated last year
- Liberating dem proprietary APT implants☆21Updated 5 years ago
- My Malware Analysis Reports☆19Updated 2 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Updated last year
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 3 years ago
- ☆37Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆52Updated 10 months ago
- Sources code extracted from malwares for analysis☆36Updated last year
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- A collection of shellcode hashes☆17Updated 6 years ago
- ☆112Updated 2 years ago
- ☆14Updated 2 years ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆78Updated 3 years ago
- Capa analysis importer for Ghidra.☆61Updated 4 years ago