dr4k0nia / GreenlineLinks
Unpacker and Config Extractor for managed Redline Stealer payloads
☆41Updated 2 years ago
Alternatives and similar repositories for Greenline
Users that are interested in Greenline are comparing it to the libraries listed below
Sorting:
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆27Updated 5 years ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- IDA Python scripts☆36Updated last month
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- A simple commandline application to automatically decrypt strings from Obfuscator protected binaries☆45Updated 11 months ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Updated last year
- ☆73Updated last year
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆25Updated 3 years ago
- a small wiper malware programmed in c#☆54Updated 2 years ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated 2 years ago
- Configuration Extractors for Malware☆106Updated last month
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆104Updated 2 years ago
- Get-UnJlaive is tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.☆22Updated 3 years ago
- A robust, multiprocessing-capable, multi-family RAT config parser/config extractor for AsyncRAT, DcRAT, VenomRAT, QuasarRAT, XWorm, Xeno …☆44Updated 2 months ago
- Antivirus killer using ring-0 kernel driver. Antivirus processes will automatically close while the killer is running.☆6Updated 2 years ago
- Bypass Malware Time Delays☆101Updated 2 years ago
- ☆38Updated 3 months ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆36Updated 3 months ago
- Easy XOR string encryption for NET based binaries☆138Updated last year
- Overwrite MBR and add own custom message☆17Updated 5 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆116Updated 10 months ago
- ☆16Updated 3 years ago
- Small PoC of using a Microsoft signed executable as a lolbin.☆137Updated 2 years ago
- simple user-mode Rootkit☆105Updated 2 years ago
- Collection of my own detection rules☆20Updated last year
- UnpacMe IDA Byte Search☆28Updated last year
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆114Updated 2 years ago
- A feed of malware samples curated from threat intelligence sources.☆28Updated last year
- General malware analysis stuff☆37Updated 9 months ago