fkie-cad / yapscanLinks
Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.
☆61Updated last year
Alternatives and similar repositories for yapscan
Users that are interested in yapscan are comparing it to the libraries listed below
Sorting:
- ☆96Updated 3 years ago
- ☆142Updated 2 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆64Updated 2 years ago
- Simple EDR implementation to demonstrate bypass☆173Updated 5 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆167Updated 2 months ago
- Lists of AMSI triggers (VBA, JScript / VBScript)☆33Updated 5 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆103Updated 2 years ago
- A small utility to deal with malware embedded hashes.☆51Updated last year
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆128Updated 2 years ago
- ☆146Updated 2 years ago
- A fake AMSI Provider which can be used for persistence.☆151Updated 4 years ago
- Experiment on reproducing Obfuscate & Sleep☆145Updated 4 years ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆88Updated this week
- Detect strange memory regions and DLLs☆184Updated 3 years ago
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆123Updated 2 years ago
- ☆52Updated 8 months ago
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆176Updated 2 years ago
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆106Updated 4 months ago
- ☆113Updated 3 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆74Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆101Updated 3 years ago
- ☆114Updated 2 years ago
- ETW based POC to identify direct and indirect syscalls☆187Updated 2 years ago
- ☆57Updated 4 years ago
- PoC to demonstrate how CLR ETW events can be tampered.☆188Updated 5 years ago
- ☆151Updated 4 years ago
- Finding secrets in kernel and user memory☆116Updated last year
- ☆70Updated 4 months ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆77Updated 10 months ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year