commial / experimentsLinks
Expriments
☆463Updated 8 months ago
Alternatives and similar repositories for experiments
Users that are interested in experiments are comparing it to the libraries listed below
Sorting:
- Extract Windows Defender database from vdm files and unpack it☆443Updated this week
- Sysmon-Like research tool for ETW☆354Updated 2 years ago
- Exploring RPC interfaces on Windows☆321Updated last year
- ☆299Updated 4 years ago
- ☆473Updated 2 years ago
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆752Updated last year
- Events from all manifest-based and mof-based ETW providers across Windows 10 versions☆299Updated last year
- OffensivePH - use old Process Hacker driver to bypass several user-mode access controls☆333Updated 3 years ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆740Updated 3 years ago
- Dump the memory of a PPL with a userland exploit☆874Updated 2 years ago
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆331Updated 2 years ago
- Enumerate and disable common sources of telemetry used by AV/EDR.☆801Updated 4 years ago
- Quickly debug shellcode extracted during malware analysis☆604Updated 2 years ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆664Updated last year
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆705Updated 4 years ago
- collect for learning cases☆585Updated last year
- Enumerating and removing kernel callbacks using signed vulnerable drivers☆566Updated 2 years ago
- PoC memory injection detection agent based on ETW, for offensive and defensive research purposes☆277Updated 4 years ago
- RPC Monitor tool based on Event Tracing for Windows☆357Updated 10 months ago
- ☆547Updated last week
- Phantom DLL hollowing PoC☆362Updated 3 years ago
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆179Updated 2 months ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆641Updated 2 years ago
- Command line interface to dump LSASS memory to disk via SilentProcessExit☆448Updated 4 years ago
- ☆489Updated 7 years ago
- Tools for discovery and abuse of COM hijacks☆311Updated 5 years ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆620Updated 2 years ago
- Managed assembly shellcode generation☆271Updated 4 years ago
- Evasive shellcode loader for bypassing event-based injection detection (PoC)☆778Updated 3 years ago
- An effort to track security vendors' use of Microsoft's Antimalware Scan Interface☆249Updated 3 years ago