ashemery / REDMLinks
Reverse Engineering and Debugging Malware
☆32Updated 2 years ago
Alternatives and similar repositories for REDM
Users that are interested in REDM are comparing it to the libraries listed below
Sorting:
- General malware analysis stuff☆37Updated last year
- Golang bindings for PE-sieve☆42Updated 2 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Updated 2 years ago
- ☆27Updated last year
- ☆22Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆40Updated 4 years ago
- Repo containing my public talks☆23Updated 2 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Updated last year
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆43Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- Python wrappers for mal_unpack☆37Updated 2 years ago
- ☆38Updated 2 years ago
- Bypass Malware Time Delays☆108Updated 3 years ago
- ☆49Updated 2 years ago
- Compile shellcode into an exe file from Windows or Linux.☆70Updated 6 months ago
- My Malware Analysis Reports☆24Updated 3 years ago
- IAT Unhooking proof-of-concept☆34Updated last year
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆75Updated 4 years ago
- ☆34Updated last year
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- ☆76Updated 3 years ago
- ☆84Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆87Updated 3 weeks ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Updated 3 years ago
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- aggregated repo for all conferences and talks I am giving☆17Updated 4 years ago
- Red Team Operation's Defense Evasion Technique.☆56Updated last year
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 6 years ago