StrangerealIntel / CerberusLinks
Sources code extracted from malwares for analysis
☆37Updated 2 years ago
Alternatives and similar repositories for Cerberus
Users that are interested in Cerberus are comparing it to the libraries listed below
Sorting:
- ☆23Updated 4 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆76Updated 5 years ago
- ☆21Updated 4 years ago
- I used this to see if an EDR is running in Safe Mode☆37Updated 4 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆73Updated 4 years ago
- POC code to crash Windows Event Logger Service☆27Updated 4 years ago
- ☆50Updated 4 years ago
- A small utility to deal with malware embedded hashes.☆51Updated last year
- Experiments on the Windows Internals☆30Updated 5 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- PoC for CVE-2020-1015☆40Updated 5 years ago
- Rekall Memory Forensic Framework☆32Updated 5 years ago
- Redteam, Pentest, APT's, Blogs, Talks, Slides links and notes☆27Updated 3 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- ☆16Updated 5 years ago
- Proof of concept of VMSA-2017-0012☆41Updated 7 years ago
- Cross-platform malware development library for anti-analysis techniques☆24Updated 3 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 8 years ago
- Self defense post module for metasploit☆17Updated 5 years ago
- adding a backdooruser using win32api☆80Updated 4 years ago
- open source malware analysis and research notes dump☆26Updated last year
- Proof of Concept code for CVE-2020-0728☆46Updated 5 years ago
- ☆43Updated 5 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆17Updated 5 years ago
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22Updated 6 years ago
- Automate AV evasion by calling AMSI☆88Updated 2 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- Methods of C2☆21Updated 9 years ago