ashemery / REDM
Reverse Engineering and Debugging Malware
☆30Updated last year
Related projects ⓘ
Alternatives and complementary repositories for REDM
- Repo containing my public talks☆22Updated last year
- ☆27Updated 3 months ago
- General malware analysis stuff☆35Updated 2 months ago
- Yara Rules for Modern Malware☆67Updated 8 months ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆51Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆35Updated 3 years ago
- quASAR: ASAR manipulation made easy☆24Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated 2 years ago
- ☆31Updated 2 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆42Updated last year
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆62Updated 2 years ago
- ☆22Updated 5 months ago
- runsc loads 32/64 bit shellcode (depending on how runsc is compiled) in a way that makes it easy to load in a debugger. This code is base…☆36Updated last year
- ☆68Updated 2 years ago
- My Malware Analysis Reports☆18Updated 2 years ago
- ☆20Updated 11 months ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆110Updated 4 months ago
- ☆34Updated last year
- Small tool to play with IOCs caused by Imageload events☆37Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆47Updated 7 months ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated last year
- ☆22Updated last month
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆30Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆79Updated 9 months ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆19Updated 2 years ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆95Updated 7 months ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆26Updated 2 months ago
- Tools helpful for malware analysis☆22Updated 3 months ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆58Updated last year