abusech / MalwareBazaar
Open platform for sharing confirmed Malware samples
☆12Updated 5 months ago
Alternatives and similar repositories for MalwareBazaar:
Users that are interested in MalwareBazaar are comparing it to the libraries listed below
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Updated last year
- Vulnerable EDR☆16Updated 5 months ago
- ☆15Updated last year
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Updated 4 years ago
- Offensive Linux tool for network attacks. Built from the ground with only C.☆14Updated 3 years ago
- shared samples from #dailyphish and/or #apt tweets☆39Updated this week
- 关闭恶意驱动的文件和注册表保护☆12Updated 2 years ago
- MuddyWater C2 framework research☆11Updated last year
- Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)☆19Updated 6 months ago
- PoC for the Untrusted Pointer Dereference in the appid.sys driver☆16Updated last year
- ☆17Updated last year
- Hide Port In Windows☆38Updated 6 months ago
- Tools for analyzing Windows containers and break container's isolation☆31Updated 2 years ago
- Yet another Windows DLL injector.☆39Updated 3 years ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆42Updated 2 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆20Updated 5 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆22Updated 5 years ago
- Beacon Debugger☆40Updated 5 months ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Updated 5 months ago
- ETWNetMonv3 is simple C# code for Monitoring TCP Network Connection via ETW & ETWProcessMon/2 is for Monitoring Process/Thread/Memory/Ima…☆39Updated last year
- Source files for my posts☆16Updated last year
- Progress of learning kernel development☆14Updated 2 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆32Updated 3 years ago
- Simple yara decompiler☆16Updated 8 years ago
- Released presentations of my talks + code that used during these talks☆13Updated 7 months ago
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆15Updated 8 years ago
- Collaborative malware exchange repository.☆33Updated 5 months ago
- Zero Wine Tryouts: An open source malware analysis tool☆17Updated 8 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆31Updated last year