Reverse Engineering and Debugging Malware
☆32Feb 27, 2023Updated 3 years ago
Alternatives and similar repositories for REDM
Users that are interested in REDM are comparing it to the libraries listed below
Sorting:
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- A care package of useful bofs for red team engagments☆53Dec 6, 2024Updated last year
- Nice try reading NTDLL from disk, nerd.☆19Apr 18, 2022Updated 3 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- ☆20Mar 21, 2024Updated last year
- ☆36Jan 11, 2023Updated 3 years ago
- A Repository to Track Anti-Forensic Techniques☆118Mar 8, 2023Updated 2 years ago
- Dump certificates from PE files in different formats☆38Dec 25, 2023Updated 2 years ago
- Playing with PE's and Building Structures by Hand☆22Apr 21, 2022Updated 3 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆63Apr 8, 2024Updated last year
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆25May 4, 2024Updated last year
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Oct 2, 2022Updated 3 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- ebpf covert channel rootkit☆15Feb 6, 2024Updated 2 years ago
- Ghidra script which fully parses COFF files☆12Oct 18, 2024Updated last year
- Cobalt Strike Aggressor script create for RTO☆16Apr 11, 2024Updated last year
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Oct 10, 2022Updated 3 years ago
- A work in progress BOF/COFF loader in Rust☆50Mar 22, 2023Updated 2 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 8 months ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 10 months ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 3 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- It's what all the kids are talking about☆12Apr 25, 2023Updated 2 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- ☆18Jun 25, 2024Updated last year
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- ☆60Jun 26, 2022Updated 3 years ago
- ☆84Aug 18, 2022Updated 3 years ago
- Official implementation for the paper "On deceiving malware classification with section injection"☆36Aug 16, 2022Updated 3 years ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- Load PE via XML Attribute☆32Feb 1, 2020Updated 6 years ago