albertzsigovits / malware-mutex
Muteces (mutexes/mutants) used by various malware families
☆23Updated 5 months ago
Alternatives and similar repositories for malware-mutex:
Users that are interested in malware-mutex are comparing it to the libraries listed below
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- Imphash-like calculation on Golang binaries☆49Updated 2 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆36Updated 2 months ago
- bad stuffs by bad guys☆48Updated 2 years ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- Reads and prints information from the website MalAPI.io☆19Updated 2 years ago
- ☆27Updated 5 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago
- ☆80Updated 5 months ago
- ☆24Updated 2 years ago
- Powershell Linter☆50Updated 3 weeks ago
- Configuration Extractor for BlackCat Ransomware☆30Updated 3 years ago
- Contains compiled binaries of Volatility☆33Updated 3 months ago
- a tiny program to consume from ETW providers for research☆47Updated 3 months ago
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- Just my findings of malwares☆44Updated 2 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆16Updated last year
- Yara Rules for Modern Malware☆77Updated last year
- ☆35Updated 2 months ago
- ☆66Updated 2 years ago
- Symantec EDR Internals☆26Updated 3 years ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆15Updated 3 months ago
- Python wrappers for mal_unpack☆36Updated last year
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- ☆37Updated last month
- ☆42Updated 2 weeks ago
- Malware Analysis tools☆26Updated 7 months ago
- Collection of generic YARA rules☆16Updated 10 months ago