Unprotect-Project / Unprotect_SubmissionLinks
Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in this exciting journey and add your expertise to our collective efforts. By contributing, you’ll help strengthen the project and push the boundaries of what we can achieve together.
☆165Updated 3 months ago
Alternatives and similar repositories for Unprotect_Submission
Users that are interested in Unprotect_Submission are comparing it to the libraries listed below
Sorting:
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆154Updated 11 months ago
- A ProcessMonitor visualization application written in rust.☆181Updated last year
- Python tool to check rootkits in Windows kernel☆197Updated 4 months ago
- ☆115Updated last week
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆117Updated 11 months ago
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆213Updated 2 years ago
- Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows☆216Updated 2 years ago
- ☆233Updated last month
- ☆260Updated 2 years ago
- ☆169Updated 2 months ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆314Updated last year
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆398Updated 2 weeks ago
- ☆105Updated last year
- ☆133Updated 2 years ago
- Tools for analyzing EDR agents☆232Updated last year
- Analyse your malware to surgically obfuscate it☆480Updated last month
- Collect Windows telemetry for Maldev☆364Updated this week
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆349Updated 5 months ago
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆231Updated last year
- Source code of exploiting windows API for red teaming series☆149Updated 2 years ago
- Configuration Extractors for Malware☆108Updated 2 months ago
- ☆251Updated last year
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆107Updated 5 months ago
- Recon 2023 slides and code☆79Updated 2 years ago
- Important notes and topics on my journey towards mastering Windows Internals☆396Updated last year
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆342Updated 11 months ago
- Repository of Yara Rules☆112Updated 3 months ago
- ☆136Updated 2 years ago
- A dynamic unpacking tool☆137Updated last year
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆109Updated 4 years ago