Offensive-Panda / MalwareAnalysisLinks
This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offers valuable resources for those focused on analyzing and understanding different types of malware.
☆18Updated 3 months ago
Alternatives and similar repositories for MalwareAnalysis
Users that are interested in MalwareAnalysis are comparing it to the libraries listed below
Sorting:
- ☆16Updated 3 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆86Updated last month
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆42Updated 11 months ago
- Tool for obtaining information about PPL processes☆17Updated last year
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- Proof-of-concept modular implant platform leveraging v8☆54Updated 5 months ago
- Yet, Another Packer/Loader☆25Updated 2 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆57Updated last year
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- Docker container for running CobaltStrike 4.10☆37Updated 11 months ago
- ☆16Updated last year
- ☆27Updated last month
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆77Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆65Updated 3 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- quASAR: ASAR manipulation made easy☆38Updated 2 years ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆20Updated 4 months ago
- A collection of PoCs for different injection techniques on Windows!☆44Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 3 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- Just another Process Injection using Process Hollowing technique.☆18Updated last year
- Windows internals and exploitation tricks☆103Updated 2 months ago
- single-threaded event driven sleep obfuscation poc for linux☆35Updated 2 months ago
- XOR-based shellcode encoder☆31Updated 2 years ago
- Parent Process ID Spoofing, coded in CGo.☆23Updated 4 months ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆99Updated last year
- ☆18Updated 7 months ago