Offensive-Panda / MalwareAnalysisLinks
This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offers valuable resources for those focused on analyzing and understanding different types of malware.
☆16Updated last month
Alternatives and similar repositories for MalwareAnalysis
Users that are interested in MalwareAnalysis are comparing it to the libraries listed below
Sorting:
- A utility that can be used to launch an executable with a DLL injected☆20Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- Yet, Another Packer/Loader☆25Updated 2 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- ☆27Updated 2 years ago
- ☆18Updated 6 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆83Updated last year
- ☆16Updated 2 months ago
- General malware analysis stuff☆37Updated 10 months ago
- Tool for obtaining information about PPL processes☆17Updated last year
- ☆17Updated 9 months ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆17Updated last year
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- ☆10Updated 6 months ago
- ☆27Updated 2 years ago
- ☆27Updated 7 months ago
- Execute Remote Assembly with args passing and with AMSI and ETW patching☆11Updated 2 years ago
- ☆18Updated 7 months ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆47Updated 2 months ago
- Parent Process ID Spoofing, coded in CGo.☆22Updated 2 months ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆62Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- RATs library 2003 to present☆14Updated last year
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆41Updated 9 months ago
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- Remap ntdll.dll using only NTAPI functions with a suspended process☆21Updated 3 months ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- A collection of my presentation materials.☆17Updated last year
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆31Updated 2 years ago
- Rust Weaponization for Red Team Engagements.☆11Updated 2 years ago