cyberark / malware-research
☆38Updated 2 months ago
Alternatives and similar repositories for malware-research:
Users that are interested in malware-research are comparing it to the libraries listed below
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- ☆27Updated 5 months ago
- Golang bindings for PE-sieve☆43Updated last year
- ☆73Updated last year
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆77Updated 2 years ago
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows …☆14Updated last year
- the Open Source and Pure C++ Packer for eXecutables☆20Updated 2 years ago
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- Antivirus killer using ring-0 kernel driver. Antivirus processes will automatically close while the killer is running.☆6Updated 2 years ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- ☆37Updated last year
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 2 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- Small visualizator for PE files☆69Updated last year
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Updated 4 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆62Updated 3 years ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆73Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago
- Repo containing my public talks☆23Updated last year
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 2 years ago
- NT AUTHORITY\SYSTEM☆39Updated 4 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆33Updated last year
- An example of COM hijacking using a proxy DLL.☆28Updated 3 years ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆56Updated last year
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- RDLL for Cobalt Strike beacon to silence sysmon process☆88Updated 2 years ago
- CSharp4Pentesters☆12Updated 3 years ago