ashemery / malware-tools
A list of useful tools for Malware Analysis (will be updated regularly)
☆122Updated 2 weeks ago
Related projects: ⓘ
- A ProcessMonitor visualization application written in rust.☆175Updated last year
- A dynamic unpacking tool☆127Updated last year
- ☆103Updated last month
- Repository of Yara Rules☆83Updated last week
- The most comprehensive resource for Virtualization with a focus on Cybersecurity, Learn, exploit, read, and create let's make the industr…☆87Updated last month
- Python tool to check rootkits in Windows kernel☆164Updated last month
- ☆93Updated 2 weeks ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆121Updated 2 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆43Updated 9 months ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated last year
- ☆181Updated 7 months ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆138Updated this week
- ☆131Updated last year
- Offensive Lua.☆174Updated 10 months ago
- Analyse your malware to surgically obfuscate it☆373Updated 11 months ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆115Updated 2 months ago
- Patching "signtool.exe" to accept expired certificates for code-signing.☆264Updated 2 months ago
- ☆263Updated last month
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆278Updated 8 months ago
- A collection of tools, scripts and personal research☆104Updated 2 months ago
- Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations…☆205Updated 2 weeks ago
- Tools for analyzing EDR agents☆200Updated 3 months ago
- Repository to publish your evasion techniques and contribute to the project☆128Updated 2 weeks ago
- ☆145Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆59Updated 2 years ago
- Create and enumerate hidden desktops.☆86Updated 9 months ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆107Updated last year
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning …☆254Updated last year
- ☆231Updated this week
- ☆222Updated this week