cyberark / malware-research
☆34Updated 2 years ago
Alternatives and similar repositories for malware-research:
Users that are interested in malware-research are comparing it to the libraries listed below
- ☆25Updated last month
- A PoC for achieving persistence via push notifications on Windows☆45Updated last year
- ☆68Updated last year
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆54Updated 8 months ago
- the Open Source and Pure C++ Packer for eXecutables☆18Updated last year
- ☆22Updated 7 months ago
- ☆36Updated last year
- IDA Python scripts☆29Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆35Updated 3 years ago
- ☆23Updated 2 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆20Updated 4 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆61Updated 2 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 2 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆73Updated 11 months ago
- Small visualizator for PE files☆67Updated last year
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆62Updated 2 years ago
- Repo containing my public talks☆22Updated last year
- Identifies metadata of .NET binary files.☆21Updated 9 months ago
- An example of COM hijacking using a proxy DLL.☆25Updated 3 years ago
- Configuration Extractor for BlackCat Ransomware☆30Updated 2 years ago
- Configuration Extractors for Malware☆55Updated 2 weeks ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆42Updated last year
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated 11 months ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆58Updated last year
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆38Updated 4 years ago
- PoC-Malware-TTPs☆49Updated last year