alichtman / malware-techniques
A collection of techniques commonly used in malware to accomplish core tasks.
☆85Updated 5 years ago
Related projects: ⓘ
- Linux Rootkits (4.x Kernel)☆83Updated 3 years ago
- Personal research and publication on malware families☆136Updated 2 years ago
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆110Updated last year
- ☆44Updated this week
- ☆46Updated last year
- This repo basically contains the code that was mentioned in the blogposts that was written by me at:☆89Updated last year
- Collection of things made during my preparation to take on OSEE☆95Updated 5 years ago
- ☆131Updated last year
- x64 Windows Exploit Development☆108Updated 3 weeks ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆135Updated 3 years ago
- ☆181Updated this week
- PoC Thread Execution Hijacking for Win32 Code Injection☆174Updated last month
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆42Updated 2 years ago
- Generate very tiny reverse shell binaries for Linux~☆74Updated 4 years ago
- ☆54Updated this week
- MoP - "Master of Puppets" - Advanced malware tracking framework☆82Updated 2 weeks ago
- simple shellcode generator☆111Updated 7 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆125Updated 9 months ago
- https://www.malwaretech.com/beginner-malware-reversing-challenges☆54Updated 5 years ago
- ☆84Updated this week
- Code snippets for bare-metal malware development☆94Updated 2 years ago
- repository of tools & resources of the MMD team☆131Updated 2 years ago
- Resources for learning malware analysis and reverse engineering☆93Updated 7 months ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆36Updated 5 years ago
- Extensible Red Team Framework☆110Updated 4 years ago
- ☆67Updated this week
- Quick script to find info about a syscall in a target architecture☆18Updated 4 years ago
- king of the hill cybersecurity competition☆26Updated 2 years ago
- A friendly Toolkit for Beginner CTF players☆41Updated 9 months ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆107Updated 4 years ago