Offensive-Panda / MalwareAnalysisLinks
This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offers valuable resources for those focused on analyzing and understanding different types of malware.
☆19Updated 8 months ago
Alternatives and similar repositories for MalwareAnalysis
Users that are interested in MalwareAnalysis are comparing it to the libraries listed below
Sorting:
- ☆17Updated 8 months ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆43Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆88Updated last month
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 6 years ago
- ☆18Updated last year
- single-threaded event driven sleep obfuscation poc for linux☆37Updated 7 months ago
- ☆63Updated last year
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated 2 years ago
- Parent Process ID Spoofing, coded in CGo.☆24Updated 9 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Updated 4 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆58Updated 2 years ago
- quASAR: ASAR manipulation made easy☆38Updated 3 years ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Updated 9 months ago
- Just another Process Injection using Process Hollowing technique.☆19Updated 2 years ago
- ☆30Updated 4 months ago
- Make an Linux Kernel rootkit visible again.☆59Updated 10 months ago
- ☆59Updated last year
- ☆61Updated 2 years ago
- Red Team Operation's Defense Evasion Technique.☆56Updated last year
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- Docker container for running CobaltStrike 4.10☆37Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Updated last year
- API Hammering with C++20☆49Updated 3 years ago
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- Progress of learning kernel development☆14Updated 3 years ago
- ☆18Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Updated 2 years ago