ashemery / REDMLinks
Reverse Engineering and Debugging Malware
☆32Updated 2 years ago
Alternatives and similar repositories for REDM
Users that are interested in REDM are comparing it to the libraries listed below
Sorting:
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- ☆22Updated last year
- ☆27Updated 9 months ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Updated 2 years ago
- General malware analysis stuff☆37Updated last year
- Repo containing my public talks☆23Updated 2 years ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆42Updated 11 months ago
- Golang bindings for PE-sieve☆42Updated last year
- My Malware Analysis Reports☆22Updated 3 years ago
- Finding secrets in kernel and user memory☆116Updated last year
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆65Updated 3 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 3 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆64Updated 3 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆75Updated 3 years ago
- Bypass Malware Time Delays☆103Updated 2 years ago
- ☆74Updated 2 years ago
- Tools helpful for malware analysis☆23Updated last year
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- aggregated repo for all conferences and talks I am giving☆17Updated 3 years ago
- Yara Rules for Modern Malware☆79Updated last year
- PowerShell PE Parser☆63Updated last year
- IAT Unhooking proof-of-concept☆30Updated last year
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- ☆37Updated 5 months ago
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆62Updated 8 months ago
- ☆82Updated 9 months ago
- ☆48Updated last year
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- Windows APT Warfare, published by Packt☆72Updated 2 years ago
- Red Team Operation's Defense Evasion Technique.☆55Updated last year