dr4k0nia / tooling-playground
A collection of small scripts and tools for deobfuscation and malware analysis.
☆65Updated last year
Alternatives and similar repositories for tooling-playground:
Users that are interested in tooling-playground are comparing it to the libraries listed below
- A C# based tool for analysing malicious OneNote documents☆109Updated last year
- Yara Rules for Modern Malware☆73Updated 10 months ago
- ☆77Updated last month
- A collection of tools, scripts and personal research☆120Updated 6 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆76Updated 4 months ago
- ☆64Updated 2 years ago
- ☆20Updated last year
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆59Updated last month
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated 11 months ago
- Configuration Extractors for Malware☆55Updated 2 weeks ago
- ☆112Updated 11 months ago
- ☆25Updated last month
- ☆131Updated last year
- Default Detections for EDR☆96Updated 10 months ago
- A collection of my yara rules☆35Updated last year
- a tiny program to consume from ETW providers for research☆45Updated 2 weeks ago
- ☆106Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆111Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆35Updated 3 years ago
- PowerShell PE Parser☆61Updated 6 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆32Updated 7 months ago
- ☆155Updated 8 months ago
- Create and enumerate hidden desktops.☆89Updated last year
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- ☆38Updated last year
- ☆186Updated last week
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 7 months ago
- Repository of Yara Rules☆96Updated 2 weeks ago