ashemery / malware-tools
A list of useful tools for Malware Analysis (will be updated regularly)
☆134Updated 4 months ago
Alternatives and similar repositories for malware-tools:
Users that are interested in malware-tools are comparing it to the libraries listed below
- ☆55Updated 3 weeks ago
- A ProcessMonitor visualization application written in rust.☆176Updated last year
- Python tool to check rootkits in Windows kernel☆180Updated 2 months ago
- A dynamic unpacking tool☆130Updated last year
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆129Updated 5 months ago
- A repository of credential stealer formats☆129Updated this week
- The most comprehensive resource for Virtualization with a focus on Cybersecurity, Learn, exploit, read, and create let's make the industr…☆101Updated 2 weeks ago
- Repository of Yara Rules☆96Updated 2 weeks ago
- ☆111Updated last month
- MacOS S☆164Updated last month
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆155Updated this week
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆49Updated last year
- A collection of small scripts and tools for deobfuscation and malware analysis.☆65Updated last year
- A collection of tools, scripts and personal research☆120Updated 6 months ago
- Tools for analyzing EDR agents☆214Updated 7 months ago
- A Repository to Track Anti-Forensic Techniques☆104Updated last year
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆87Updated 2 months ago
- ☆131Updated last year
- Centralized resource for listing and organizing known injection techniques and POCs☆239Updated 2 months ago
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆147Updated last week
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆131Updated last year
- Patching "signtool.exe" to accept expired certificates for code-signing.☆275Updated 5 months ago
- ☆96Updated last month
- Create and enumerate hidden desktops.☆89Updated last year
- ELFEN: Automated Linux Malware Analysis Sandbox☆120Updated 6 months ago
- ☆154Updated last year
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆174Updated last year
- ☆294Updated 2 months ago
- Analyse your malware to surgically obfuscate it☆435Updated this week
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆295Updated last year