ProfessionallyEvil / x86_asmLinks
x86 Assembly Code Examples for Blog Posts
☆17Updated 2 years ago
Alternatives and similar repositories for x86_asm
Users that are interested in x86_asm are comparing it to the libraries listed below
Sorting:
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- ☆28Updated 7 months ago
- AMSI detection PoC☆31Updated 5 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- ☆24Updated last year
- Work in Progress repo☆14Updated 6 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆25Updated 3 years ago
- A collection of my presentation materials.☆17Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- Specialized tool to dump Position Independent Code.☆22Updated 4 years ago
- ☆16Updated 4 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆14Updated 4 years ago
- Registry hive parsing the async way☆21Updated 2 months ago
- Rite Of Passage ROP Injector☆34Updated 5 years ago
- ☆16Updated 4 years ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated last year
- Generates YARA rules to detect malware using API hashing☆17Updated 4 years ago
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows …☆14Updated last year
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- ☆18Updated last year
- A tool to assist in analysis of packed HelloKitty ransomware binaries☆11Updated 3 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 3 years ago
- A collection of shellcode hashes☆17Updated 6 years ago
- Dumping credentials through windbg and pykd☆40Updated last year
- ☆12Updated 2 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆61Updated 3 years ago