ashemery / REDM
Reverse Engineering and Debugging Malware
☆30Updated 2 years ago
Alternatives and similar repositories for REDM:
Users that are interested in REDM are comparing it to the libraries listed below
- Repo containing my public talks☆23Updated last year
- ☆26Updated 4 months ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆39Updated 6 months ago
- General malware analysis stuff☆36Updated 7 months ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 2 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆53Updated 11 months ago
- quASAR: ASAR manipulation made easy☆34Updated 2 years ago
- ☆22Updated 10 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago
- Yara Rules for Modern Malware☆75Updated last year
- ☆71Updated last year
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆55Updated 2 years ago
- Golang bindings for PE-sieve☆42Updated last year
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆31Updated 2 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆87Updated 2 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆114Updated 8 months ago
- ☆71Updated 7 months ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆73Updated 3 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆62Updated 2 years ago
- ☆33Updated 3 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated 10 months ago
- ☆72Updated 2 years ago
- Reads and prints information from the website MalAPI.io☆19Updated 2 years ago
- pypykatz plugin for volatility3 framework☆39Updated 11 months ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆96Updated 11 months ago
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆61Updated 3 months ago
- OFFZONE 2024 Malware Persistence workshop☆19Updated 3 months ago
- Tools helpful for malware analysis☆22Updated 7 months ago