Malwation / sentelloLinks
Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.
☆73Updated 4 years ago
Alternatives and similar repositories for sentello
Users that are interested in sentello are comparing it to the libraries listed below
Sorting:
- TrashDBG the world's worse debugger☆23Updated 3 years ago
- A small utility to deal with malware embedded hashes.☆51Updated last year
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆106Updated 3 months ago
- Malware Configuration Extraction Modules☆50Updated last year
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆128Updated last year
- Winsock accept() Backdoor Implant.☆113Updated 4 years ago
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- Unpacking and decryption tools for the Emotet malware☆46Updated 3 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- The following repository contains a modified version of SUNBURST with cracekd hashes, comments and annotations.☆56Updated 4 years ago
- ☆22Updated last year
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆70Updated 3 years ago
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆108Updated 4 years ago
- Lazarus analysis tools and research report☆56Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- Small visualizator for PE files☆69Updated last year
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆64Updated 7 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 3 years ago
- A collection of shellcode hashes☆17Updated 6 years ago
- Red Team Operator: Malware Development Essentials Course☆98Updated 4 years ago
- API Logger for Windows Executables☆78Updated 4 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆83Updated last year
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆114Updated 2 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- PE File Blessing - To continue or not to continue☆87Updated 5 years ago
- Evasive Process Hollowing Techniques☆139Updated 4 years ago
- Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.☆75Updated 2 years ago
- Capa analysis importer for Ghidra.☆61Updated 4 years ago