Malwation / sentelloLinks
Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.
☆75Updated 4 years ago
Alternatives and similar repositories for sentello
Users that are interested in sentello are comparing it to the libraries listed below
Sorting:
- A small utility to deal with malware embedded hashes.☆52Updated 2 years ago
- Winsock accept() Backdoor Implant.☆117Updated 4 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆130Updated last year
- TrashDBG the world's worse debugger☆23Updated 3 years ago
- Unpacking and decryption tools for the Emotet malware☆45Updated 3 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆105Updated 4 months ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- A repository where I share my injection implemintations☆29Updated 5 years ago
- The following repository contains a modified version of SUNBURST with cracekd hashes, comments and annotations.☆56Updated 4 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 3 years ago
- Malware Configuration Extraction Modules☆51Updated last year
- Using Spotify Playlists as Malware CDN☆27Updated 4 years ago
- Lazarus analysis tools and research report☆56Updated last year
- ☆74Updated last year
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆112Updated 4 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- ☆23Updated 5 years ago
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆118Updated 2 years ago
- ☆22Updated last year
- ☆137Updated 7 months ago
- API Logger for Windows Executables☆79Updated 5 years ago
- A collection of shellcode hashes☆17Updated 7 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- My Malware Analysis Reports☆23Updated 3 years ago
- Sources code extracted from malwares for analysis☆40Updated 2 years ago
- Small visualizator for PE files☆70Updated 2 years ago
- Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.☆77Updated 2 years ago
- Capa analysis importer for Ghidra.☆63Updated 4 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆53Updated 4 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆55Updated 6 years ago