dr4k0nia / GreenlineLinks
Unpacker and Config Extractor for managed Redline Stealer payloads
☆42Updated 2 years ago
Alternatives and similar repositories for Greenline
Users that are interested in Greenline are comparing it to the libraries listed below
Sorting:
- ☆74Updated last year
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆116Updated 2 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Updated 2 years ago
- Python wrappers for mal_unpack☆36Updated last year
- A simple commandline application to automatically decrypt strings from Obfuscator protected binaries☆46Updated last year
- Easy XOR string encryption for NET based binaries☆139Updated last year
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆26Updated 3 years ago
- Collection of my own detection rules☆21Updated last month
- Bypass Malware Time Delays☆102Updated 2 years ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Updated last year
- A Bumblebee-inspired Crypter☆79Updated 2 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆117Updated last year
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated 2 years ago
- Get-UnJlaive is tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.☆22Updated 3 years ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆106Updated 2 years ago
- General malware analysis stuff☆37Updated 11 months ago
- ☆37Updated 5 months ago
- ☆22Updated last year
- Golang bindings for PE-sieve☆42Updated last year
- a small wiper malware programmed in c#☆58Updated 2 years ago
- ☆27Updated 8 months ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 5 years ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- IDA Python scripts☆41Updated 3 months ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- Small visualizator for PE files☆69Updated last year
- Repo containing my public talks☆23Updated 2 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Updated 3 years ago
- Compile shellcode into an exe file from Windows or Linux.☆68Updated 2 months ago