aelth / dementia-forensicsLinks
Proof of concept memory anti-forensic toolkit designed for hiding various artifacts inside the memory dump during memory acquisition on Microsoft Windows operating system
☆13Updated 6 years ago
Alternatives and similar repositories for dementia-forensics
Users that are interested in dementia-forensics are comparing it to the libraries listed below
Sorting:
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆58Updated 5 months ago
- ☆65Updated last year
- This tool is the result of a reverse engineering process of the Windows service called SysMain. Time to interact with the prefetch files …☆32Updated 5 years ago
- A set of small utilities, helpers for PIN tracers☆35Updated 3 months ago
- ☆23Updated 4 years ago
- Simple PE Packer Which Encrypts .text Section☆50Updated 8 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Updated 7 years ago
- A small library helping to parse commandline parameters (for C/C++)☆58Updated 8 months ago
- Archive of ransomware decryptors☆34Updated 8 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Updated 10 years ago
- Sysmon shenanigans☆66Updated 5 years ago
- Evil Reflective DLL Injection Finder☆47Updated 7 years ago
- Blocks drivers from loading by using a name collision technique. #nsacyber☆50Updated 8 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆63Updated last year
- A simple rootkit to hide a process☆47Updated 12 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆36Updated 2 years ago
- Rekall Memory Forensic Framework☆33Updated 6 years ago
- Blog posts☆29Updated 5 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 7 years ago
- NT AUTHORITY\SYSTEM☆43Updated 5 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆36Updated 4 years ago
- Code that can be used as a reference, library, or inspiration for hacking Windows memory.☆53Updated 5 years ago
- Ammyy v3 Source Code leak , with ❤️ <3☆41Updated 9 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆32Updated 5 years ago
- Demos and presentation from SECArmy Village Grayhat 2020☆37Updated 2 years ago
- ☆76Updated 2 years ago
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆27Updated 3 years ago
- ☆18Updated 4 years ago