ashemery / REDMLinks
Reverse Engineering and Debugging Malware
☆32Updated 2 years ago
Alternatives and similar repositories for REDM
Users that are interested in REDM are comparing it to the libraries listed below
Sorting:
- ☆27Updated 7 months ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆45Updated 2 years ago
- ☆33Updated 3 years ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆41Updated 9 months ago
- ☆22Updated last year
- Golang bindings for PE-sieve☆43Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆38Updated 3 years ago
- Repo containing my public talks☆23Updated 2 years ago
- Collection of my own detection rules☆20Updated last year
- General malware analysis stuff☆37Updated 10 months ago
- Malware Samples that could be used for teaching students about malware analysis.☆56Updated last year
- ☆34Updated 2 years ago
- aggregated repo for all conferences and talks I am giving☆17Updated 3 years ago
- Yara Rules for Modern Malware☆77Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Updated 2 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- ☆45Updated last year
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated 2 years ago
- ☆22Updated last year
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- ☆23Updated last year
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- Identifies metadata of .NET binary files.☆21Updated last year
- My Malware Analysis Reports☆20Updated 3 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆67Updated last year
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆62Updated 6 months ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆64Updated 2 years ago