ashemery / Anti-ForensicsLinks
A Repository to Track Anti-Forensic Techniques
☆118Updated 2 years ago
Alternatives and similar repositories for Anti-Forensics
Users that are interested in Anti-Forensics are comparing it to the libraries listed below
Sorting:
- ☆86Updated 3 years ago
- ☆84Updated last year
- ☆120Updated 2 years ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆60Updated 4 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆89Updated 2 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Updated 2 years ago
- ☆35Updated 2 years ago
- ☆37Updated last year
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- ☆138Updated 2 years ago
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 6 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Updated 4 years ago
- Make an Linux Kernel rootkit visible again.☆59Updated 11 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆182Updated last week
- information about ransomware groups (Ransomware Analysis Notes)☆40Updated 2 years ago
- ☆107Updated 2 years ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆137Updated last week
- Create and enumerate hidden desktops.☆89Updated 2 years ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Updated 11 months ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128Updated last year
- Vibe Malware Triage - MCP server for static PE analysis.☆74Updated 2 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆124Updated last month
- vulnlab.com reaper writeup☆27Updated 2 years ago
- ☆133Updated 2 years ago
- ☆56Updated last year
- ☆38Updated 2 years ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆38Updated last year