aN0mad / analysisTools
Malware analysis tools used alongside "Practical Malware Analysis: The Hands-on Guide to Dissecting Malicious Software" Book by Andrew Honig and Michael Sikorski
☆37Updated 6 years ago
Alternatives and similar repositories for analysisTools:
Users that are interested in analysisTools are comparing it to the libraries listed below
- An Xdbg Plugin of the ERC Library.☆169Updated 11 months ago
- Windows APT Warfare, published by Packt☆67Updated last year
- All binaries file of the PracticalMalwareAnalysis-Labs copied from internet☆34Updated 7 years ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆156Updated this week
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆350Updated 2 months ago
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆198Updated last year
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆147Updated 2 weeks ago
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performs…☆165Updated 8 months ago
- Malware Samples that could be used for teaching students about malware analysis.☆51Updated 9 months ago
- Graphical interface for PortEx, a Portable Executable and Malware Analysis Library☆133Updated 6 months ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆629Updated 2 years ago
- Vulnerable driver research tool, result and exploit PoCs☆184Updated last year
- Just another collection of links, tools, reports and other stuff☆22Updated 3 years ago
- Powershell script deobfuscation using AST in Python☆64Updated last year
- Simulate the behavior of AV/EDR for malware development training.☆460Updated 11 months ago
- Source code of exploiting windows API for red teaming series☆146Updated 2 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆99Updated 2 years ago
- Dump quarantined files from Windows Defender☆61Updated 2 years ago
- ☆68Updated last year
- Extracted Yara rules from Windows Defender mpavbase and mpasbase☆319Updated 2 months ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆79Updated 2 years ago
- Malware Analysis Tools☆30Updated 5 years ago
- Finding secrets in kernel and user memory☆113Updated last year
- ☆291Updated 3 years ago
- ☆49Updated 3 months ago
- Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.☆42Updated last year
- TartarusGate, Bypassing EDRs☆559Updated 2 years ago
- Exercise writeups from the book Practical Malware Analysis.☆200Updated last year
- ☆84Updated 2 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆82Updated last year