cyberark / malware-researchLinks
☆37Updated 5 months ago
Alternatives and similar repositories for malware-research
Users that are interested in malware-research are comparing it to the libraries listed below
Sorting:
- ☆74Updated last year
- NT AUTHORITY\SYSTEM☆38Updated 5 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆55Updated last week
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- ☆27Updated 8 months ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆116Updated 2 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- Python wrappers for mal_unpack☆36Updated last year
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 5 years ago
- Bypass Malware Time Delays☆102Updated 2 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆128Updated 3 years ago
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆77Updated 2 years ago
- General malware analysis stuff☆37Updated 11 months ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆63Updated 3 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- ☆55Updated 3 years ago
- Small visualizator for PE files☆69Updated last year
- A Bumblebee-inspired Crypter☆79Updated 2 years ago
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows …☆14Updated 2 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Updated 2 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- using the gpu to hide your payload☆59Updated 2 years ago
- Unpacking and decryption tools for the Emotet malware☆45Updated 3 years ago
- My Malware Analysis Reports☆21Updated 3 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Updated 4 years ago
- The Console Monitor Driver is a KMDF kernel-mode filter driver that captures certain Fast I/O operations (input and output) that is sent …☆39Updated 2 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆35Updated 3 years ago
- ☆22Updated last year