Offensive-Panda / MalwareAnalysisLinks
This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offers valuable resources for those focused on analyzing and understanding different types of malware.
☆18Updated 4 months ago
Alternatives and similar repositories for MalwareAnalysis
Users that are interested in MalwareAnalysis are comparing it to the libraries listed below
Sorting:
- ☆16Updated 5 months ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- ☆30Updated last month
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆57Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆86Updated 2 months ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- Parent Process ID Spoofing, coded in CGo.☆23Updated 5 months ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆54Updated 9 months ago
- Make an Linux Kernel rootkit visible again.☆57Updated 7 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 3 years ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆42Updated last year
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- single-threaded event driven sleep obfuscation poc for linux☆35Updated 3 months ago
- ☆18Updated 8 months ago
- quASAR: ASAR manipulation made easy☆38Updated 3 years ago
- Red Team Operation's Defense Evasion Technique.☆55Updated last year
- Docker container for running CobaltStrike 4.10☆37Updated last year
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆20Updated 6 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆66Updated 3 years ago
- Awesome list of Living off the Land (LOL) methods, tools, and features commonly abused by attackers☆28Updated 6 months ago
- Items related to the RedELK workshop given at security conferences☆30Updated 2 years ago
- Tool for obtaining information about PPL processes☆17Updated last year
- ☆60Updated last year
- A collection of PoCs for different injection techniques on Windows!☆46Updated 2 years ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- Windows internals and exploitation tricks☆106Updated 3 months ago
- Collection of Rust repos useful for Red Teamers.☆34Updated 3 years ago
- UAC Bypass using CMSTP in Rust☆32Updated 10 months ago