ashemery / REDMLinks
Reverse Engineering and Debugging Malware
☆32Updated 2 years ago
Alternatives and similar repositories for REDM
Users that are interested in REDM are comparing it to the libraries listed below
Sorting:
- ☆27Updated 9 months ago
- Repo containing my public talks☆23Updated 2 years ago
- General malware analysis stuff☆37Updated last year
- ☆22Updated last year
- Golang bindings for PE-sieve☆42Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Updated 2 years ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆42Updated 11 months ago
- ☆37Updated 6 months ago
- Python wrappers for mal_unpack☆37Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 3 years ago
- IDA Python scripts☆41Updated 5 months ago
- My Malware Analysis Reports☆23Updated 3 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆75Updated 3 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- ☆74Updated last year
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆66Updated 2 years ago
- ☆48Updated last year
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆64Updated 3 years ago
- Bypass Malware Time Delays☆103Updated 2 years ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Updated last year
- Compile shellcode into an exe file from Windows or Linux.☆69Updated 3 months ago
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- ☆82Updated 10 months ago
- Collection of my own detection rules☆21Updated 2 months ago
- ☆30Updated 3 weeks ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆66Updated 3 years ago
- Identifies metadata of .NET binary files.☆21Updated last year
- ☆38Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Updated 2 years ago
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆111Updated 4 years ago