TheEnergyStory / malware_analysis_toolsLinks
Tools helpful for malware analysis
☆23Updated 11 months ago
Alternatives and similar repositories for malware_analysis_tools
Users that are interested in malware_analysis_tools are comparing it to the libraries listed below
Sorting:
- ☆27Updated 7 months ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- ☆18Updated last year
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Updated 2 years ago
- A repo to house files for our blogposts on blog.nviso.eu☆72Updated 4 months ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Updated 4 years ago
- A collection of my presentation materials.☆17Updated last year
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆64Updated 3 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆38Updated 3 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- A PoC for achieving persistence via push notifications on Windows☆46Updated 2 years ago
- ☆37Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 3 years ago
- ☆23Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆33Updated 2 years ago
- ☆42Updated 3 years ago
- pypykatz plugin for volatility3 framework☆40Updated last month
- WMI SA stuffs☆30Updated 3 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Specialized tool to dump Position Independent Code.☆22Updated 4 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- Malware Analysis tools☆26Updated 10 months ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated 2 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- ☆12Updated 3 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- Execute embedded Mimikatz☆13Updated 3 years ago