Offensive-Panda / MalwareAnalysis
This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offers valuable resources for those focused on analyzing and understanding different types of malware.
☆14Updated 5 months ago
Alternatives and similar repositories for MalwareAnalysis:
Users that are interested in MalwareAnalysis are comparing it to the libraries listed below
- A utility that can be used to launch an executable with a DLL injected☆18Updated last year
- Recon-ng modules for basic OSINT.☆11Updated 2 years ago
- Yet, Another Packer/Loader☆25Updated 2 years ago
- Remap ntdll.dll using only NTAPI functions with a suspended process☆21Updated last week
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- Offensive Assembly code snippets.☆12Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 7 months ago
- ☆27Updated last year
- ☆16Updated 2 months ago
- Just another Process Injection using Process Hollowing technique.☆17Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- ☆12Updated 2 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆16Updated last year
- ☆18Updated 4 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- A collection of my presentation materials.☆17Updated 11 months ago
- ☆17Updated 6 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆20Updated 3 weeks ago
- ☆27Updated 4 months ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 2 years ago
- Parent Process ID Spoofing, coded in CGo.☆22Updated 9 months ago
- ☆18Updated 3 months ago
- ECC Public Key Cryptography☆37Updated last year
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- Implementation of ITaskHandler in C++☆13Updated 2 years ago
- AES-256 Microsoft Cryptography API Example Use.☆30Updated last year
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- Seven different DLL injection techniques in one single project.☆11Updated 4 years ago