ashemery / REDMLinks
Reverse Engineering and Debugging Malware
☆32Updated 2 years ago
Alternatives and similar repositories for REDM
Users that are interested in REDM are comparing it to the libraries listed below
Sorting:
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Updated 4 years ago
- Golang bindings for PE-sieve☆42Updated last year
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- My Malware Analysis Reports☆23Updated 3 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆45Updated 2 years ago
- ☆22Updated last year
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆67Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- Finding secrets in kernel and user memory☆115Updated 2 years ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆42Updated last year
- ☆27Updated 11 months ago
- aggregated repo for all conferences and talks I am giving☆17Updated 4 years ago
- ☆48Updated last year
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆75Updated 3 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated 2 years ago
- Repo containing my public talks☆23Updated 2 years ago
- General malware analysis stuff☆37Updated last year
- Bypass Malware Time Delays☆105Updated 3 years ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Updated last year
- Windows internals and exploitation tricks☆105Updated 4 months ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Updated 3 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆67Updated 2 years ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- ☆82Updated 11 months ago