Offensive-Panda / MalwareAnalysisLinks
This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offers valuable resources for those focused on analyzing and understanding different types of malware.
☆18Updated 5 months ago
Alternatives and similar repositories for MalwareAnalysis
Users that are interested in MalwareAnalysis are comparing it to the libraries listed below
Sorting:
- ☆17Updated 6 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆86Updated 4 months ago
- Make an Linux Kernel rootkit visible again.☆59Updated 8 months ago
- ☆18Updated 10 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆43Updated last year
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆58Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆56Updated 10 months ago
- ☆39Updated last year
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- Items related to the RedELK workshop given at security conferences☆29Updated 2 years ago
- Red Team Operation's Defense Evasion Technique.☆55Updated last year
- ☆34Updated 2 years ago
- ☆18Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Updated 2 years ago
- Docker container for running CobaltStrike 4.10☆37Updated last year
- ☆30Updated 2 months ago
- Just another Process Injection using Process Hollowing technique.☆19Updated 2 years ago
- ☆107Updated 2 years ago
- Parent Process ID Spoofing, coded in CGo.☆23Updated 6 months ago
- single-threaded event driven sleep obfuscation poc for linux☆35Updated 5 months ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆52Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 4 years ago
- ECC Public Key Cryptography☆38Updated 2 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆27Updated last year
- ☆59Updated last year
- A scanner that files with compromised or untrusted code signing certificates written in python.☆64Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago