TheEnergyStory / malware_analysis_toolsLinks
Tools helpful for malware analysis
☆23Updated last year
Alternatives and similar repositories for malware_analysis_tools
Users that are interested in malware_analysis_tools are comparing it to the libraries listed below
Sorting:
- ☆27Updated 10 months ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆65Updated 3 years ago
- A repo to house files for our blogposts on blog.nviso.eu☆73Updated 6 months ago
- A collection of my presentation materials.☆17Updated last year
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- ☆18Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 3 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆75Updated 3 years ago
- pypykatz plugin for volatility3 framework☆43Updated 4 months ago
- ☆37Updated 3 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Updated 3 years ago
- ☆43Updated 3 years ago
- ☆45Updated last year
- ☆74Updated 2 years ago
- A PoC for achieving persistence via push notifications on Windows☆47Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Updated 3 years ago
- AdHoc solutions☆48Updated 2 years ago
- Tools for offensive security of NetBackup infrastructures☆40Updated 2 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Updated 3 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆37Updated 3 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Updated 4 years ago
- Specialized tool to dump Position Independent Code.☆22Updated 5 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆66Updated 3 years ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆43Updated 4 years ago
- Tool to manage user privileges☆30Updated 6 years ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Updated 4 years ago