ashemery / REDMLinks
Reverse Engineering and Debugging Malware
☆31Updated 2 years ago
Alternatives and similar repositories for REDM
Users that are interested in REDM are comparing it to the libraries listed below
Sorting:
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆41Updated 8 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆38Updated 3 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- ☆27Updated 6 months ago
- ☆22Updated last year
- General malware analysis stuff☆37Updated 9 months ago
- Repo containing my public talks☆23Updated 2 years ago
- aggregated repo for all conferences and talks I am giving☆17Updated 3 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆54Updated last year
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- ☆48Updated last year
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆31Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- ☆20Updated last year
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆106Updated 3 months ago
- Small visualizator for PE files☆69Updated last year
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆108Updated 4 years ago
- IAT Unhooking proof-of-concept☆29Updated last year
- Collection of my own detection rules☆20Updated last year
- ☆119Updated last year
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆62Updated 2 years ago
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆37Updated 3 years ago
- Bypass Malware Time Delays☆101Updated 2 years ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆36Updated 3 months ago
- Golang bindings for PE-sieve☆43Updated last year
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆62Updated 5 months ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆83Updated 2 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆88Updated 2 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated 2 years ago