ashemery / REDMLinks
Reverse Engineering and Debugging Malware
☆32Updated 2 years ago
Alternatives and similar repositories for REDM
Users that are interested in REDM are comparing it to the libraries listed below
Sorting:
- ☆27Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Updated 4 years ago
- General malware analysis stuff☆37Updated last year
- Repo containing my public talks☆23Updated 2 years ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆43Updated last year
- ☆22Updated last year
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- My Malware Analysis Reports☆24Updated 3 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆45Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- Golang bindings for PE-sieve☆42Updated 2 years ago
- Python wrappers for mal_unpack☆37Updated 2 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆75Updated 4 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Updated 3 years ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- Collection of my own detection rules☆20Updated 2 weeks ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆70Updated 3 years ago
- Bypass Malware Time Delays☆108Updated 3 years ago
- aggregated repo for all conferences and talks I am giving☆17Updated 4 years ago
- IAT Unhooking proof-of-concept☆34Updated last year
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- PowerShell PE Parser☆62Updated last year
- quASAR: ASAR manipulation made easy☆38Updated 3 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆67Updated 2 years ago
- ☆76Updated 3 years ago
- ☆49Updated 2 years ago
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- ☆35Updated last week
- ☆38Updated 2 years ago