dodo-sec / Malware-Analysis
β131Updated last year
Alternatives and similar repositories for Malware-Analysis:
Users that are interested in Malware-Analysis are comparing it to the libraries listed below
- Free training course offered at Hack Space Con 2023β136Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD πβ90Updated 5 months ago
- β84Updated 2 years ago
- β77Updated last month
- Find potential DLL Sideloads on your windows computerβ168Updated this week
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.β175Updated last year
- β269Updated last year
- The most average C2 ever (MACE)β96Updated 2 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusingβ¦β98Updated last year
- An interactive shell to spoof some LOLBins command lineβ181Updated 11 months ago
- A collection of tools, scripts and personal researchβ120Updated 6 months ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.β251Updated last year
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.β76Updated 4 months ago
- A collection of tools that I use in CTF's or for assessmentsβ72Updated this week
- Completely Risky Active-Directory Simulation Hubβ99Updated last year
- A ProcessMonitor visualization application written in rust.β176Updated last year
- β185Updated 11 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movementβ152Updated last month
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning β¦β267Updated last year
- β296Updated 2 months ago
- β104Updated 6 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders undβ¦β116Updated 9 months ago
- β163Updated 2 years ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.β130Updated 2 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)β159Updated last year
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.β303Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reductiβ¦β192Updated 7 months ago
- β127Updated last year
- linikatz is a tool to attack AD on UNIXβ138Updated last year