Reverse Engineering and Debugging Malware
☆31Feb 27, 2023Updated 3 years ago
Alternatives and similar repositories for REDM
Users that are interested in REDM are comparing it to the libraries listed below
Sorting:
- A Repository to Track Anti-Forensic Techniques☆119Mar 8, 2023Updated 3 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆64Apr 8, 2024Updated last year
- A care package of useful bofs for red team engagments☆53Dec 6, 2024Updated last year
- Nice try reading NTDLL from disk, nerd.☆19Apr 18, 2022Updated 3 years ago
- ☆36Jan 11, 2023Updated 3 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Spawn Up quickly Elastic EDR Panel☆13Jan 29, 2022Updated 4 years ago
- ☆20Mar 21, 2024Updated 2 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Oct 2, 2022Updated 3 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- Load PE via XML Attribute☆32Feb 1, 2020Updated 6 years ago
- Playing with PE's and Building Structures by Hand☆22Apr 21, 2022Updated 3 years ago
- ☆61Jun 26, 2022Updated 3 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- Plugin for NOPing instructions in IDA☆21May 9, 2024Updated last year
- Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low…☆148May 6, 2023Updated 2 years ago
- ebpf covert channel rootkit☆15Feb 6, 2024Updated 2 years ago
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆59Jun 6, 2023Updated 2 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- ☆17Mar 6, 2023Updated 3 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- Dump certificates from PE files in different formats☆39Dec 25, 2023Updated 2 years ago
- ☆84Aug 18, 2022Updated 3 years ago
- ☆21May 8, 2022Updated 3 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆22Jan 5, 2025Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Oct 10, 2022Updated 3 years ago
- Linux Evidence Acquisition Framework☆119Sep 30, 2024Updated last year
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆158Jun 15, 2023Updated 2 years ago
- TCP reverse shell written in C# with the option to choose between Windows command prompt or MS powershell.☆26May 9, 2019Updated 6 years ago
- Patch AMSI and ETW☆250May 8, 2024Updated last year