bootkitsbook / bootkits
☆62Updated 5 years ago
Alternatives and similar repositories for bootkits:
Users that are interested in bootkits are comparing it to the libraries listed below
- ☆104Updated 5 years ago
- ☆33Updated 3 years ago
- Parsers for custom malware formats ("Funky malware formats")☆93Updated 3 years ago
- ☆19Updated last month
- POC viruses I have created to demo some ideas☆59Updated 4 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 4 years ago
- SentinelOne's KeRnel Exploits Advanced Mitigations☆53Updated 6 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆40Updated 5 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆120Updated 4 years ago
- Capa analysis importer for Ghidra.☆61Updated 4 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆89Updated 5 years ago
- Flare-On solutions☆36Updated 5 years ago
- Hyper-V Research is trendy now☆177Updated 10 months ago
- ☆51Updated 6 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- Windows Drivers☆97Updated 5 years ago
- Go Lang Portable Executable Parser☆39Updated 3 years ago
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆84Updated 2 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆43Updated last year
- Windows NT ioctl bruteforcer and modular fuzzer☆121Updated 6 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆75Updated 10 years ago
- Ghidra plugin for https://analyze.intezer.com☆70Updated 2 years ago
- ☆67Updated last year
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆49Updated 6 years ago
- ☆13Updated 5 years ago
- Driver Initial Reconnaissance Tool☆122Updated 5 years ago
- BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)☆123Updated 3 years ago
- ☆33Updated 3 years ago
- In line function hooking LKM rootkit☆51Updated 5 years ago
- ☆108Updated 4 years ago