cyberark / malware-researchLinks
☆37Updated 11 months ago
Alternatives and similar repositories for malware-research
Users that are interested in malware-research are comparing it to the libraries listed below
Sorting:
- ☆76Updated 2 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Updated 4 months ago
- Compile shellcode into an exe file from Windows or Linux.☆71Updated 7 months ago
- Golang bindings for PE-sieve☆42Updated 2 years ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆118Updated 2 years ago
- Small visualizator for PE files☆70Updated 2 years ago
- Python wrappers for mal_unpack☆37Updated 2 years ago
- NT AUTHORITY\SYSTEM☆43Updated 5 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆21Updated 5 years ago
- ☆35Updated 3 weeks ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- ☆27Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆45Updated 2 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 3 years ago
- Listing UDP connections with remote address without sniffing.☆31Updated 2 years ago
- Bypass Malware Time Delays☆108Updated 3 years ago
- General malware analysis stuff☆37Updated last year
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆58Updated 5 months ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆70Updated 3 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆30Updated last year
- ☆10Updated 3 years ago
- Windows internals and exploitation tricks☆112Updated 2 months ago
- Neutralize KEPServerEX anti-debugging techniques☆33Updated 2 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 5 years ago
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆82Updated 3 years ago