UncleJ4ck / MalSys
Malsys is a project designed to validate and analyze files for potential malware signatures.
☆21Updated last year
Related projects ⓘ
Alternatives and complementary repositories for MalSys
- A simple to use single-include Windows API resolver☆17Updated 4 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆22Updated 2 years ago
- Mythic C2 wrapper for NimSyscallPacker☆19Updated this week
- ☆13Updated last year
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆17Updated last year
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆37Updated last year
- Scripts to interact with Microsoft Graph APIs☆30Updated 2 weeks ago
- ☆17Updated last year
- ☆22Updated 6 months ago
- ☆29Updated 2 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Updated 2 years ago
- ☆15Updated 8 months ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆34Updated last year
- in-process powershell runner for BRC4☆37Updated last year
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆12Updated 4 years ago
- Nemesis agent for Mythic☆25Updated 2 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆30Updated 6 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆27Updated last year
- A collection of sample code used in some experiments with Sliver C2☆13Updated last year
- ☆46Updated last year
- Items related to the RedELK workshop given at security conferences☆27Updated last year
- Detect userland hooks placed by AV/EDR☆26Updated last year
- Extension functionality for the NightHawk operator client☆26Updated last year
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆31Updated 3 weeks ago
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- ☆15Updated last year
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Just another Process Injection using Process Hollowing technique.☆16Updated last year