Malwation / sentelloLinks
Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.
☆75Updated 4 years ago
Alternatives and similar repositories for sentello
Users that are interested in sentello are comparing it to the libraries listed below
Sorting:
- A small utility to deal with malware embedded hashes.☆53Updated 2 years ago
- Winsock accept() Backdoor Implant.☆118Updated 4 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆106Updated 8 months ago
- A repository where I share my injection implemintations☆29Updated 5 years ago
- Unpacking and decryption tools for the Emotet malware☆45Updated 4 years ago
- My Malware Analysis Reports☆25Updated 3 years ago
- The following repository contains a modified version of SUNBURST with cracekd hashes, comments and annotations.☆56Updated 5 years ago
- TrashDBG the world's worse debugger☆23Updated 3 years ago
- Red Team Operator: Malware Development Essentials Course☆99Updated 5 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 5 years ago
- ☆138Updated 2 months ago
- ☆23Updated 5 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆131Updated 2 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Updated 3 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 4 years ago
- A collection of shellcode hashes☆17Updated 7 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆75Updated 5 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆45Updated 2 years ago
- ☆23Updated last year
- Small visualizator for PE files☆70Updated 2 years ago
- Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.☆80Updated 2 years ago
- PE File Blessing - To continue or not to continue☆87Updated 6 years ago
- API Logger for Windows Executables☆80Updated 5 years ago
- Lazarus analysis tools and research report☆57Updated 2 years ago
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆111Updated 4 years ago
- ☆76Updated 2 years ago
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- ☆18Updated 4 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆74Updated 3 years ago