hasherezade / hidden_bee_tools
Parser for a custom executable format from Hidden Bee malware (first stage)
☆39Updated 5 months ago
Alternatives and similar repositories for hidden_bee_tools:
Users that are interested in hidden_bee_tools are comparing it to the libraries listed below
- ☆22Updated 4 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- ☆31Updated 4 years ago
- Another Portable Executable files analysing stuff☆20Updated 13 years ago
- ☆22Updated 4 years ago
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago
- Kernel mode windows NT API logger☆22Updated 5 years ago
- My collection of unpackers for malware packers/crypters☆28Updated 7 years ago
- Example for PagedOut!☆24Updated 5 years ago
- Clone running process with ZwCreateProcess☆57Updated 4 years ago
- A set of small utilities, helpers for PIN tracers☆31Updated last year
- A small library helping to parse commandline parameters (for C/C++)☆54Updated last year
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆16Updated 6 years ago
- PoC for detecting and dumping process hollowing code injection☆51Updated 6 years ago
- The Grum Spam Bot☆20Updated 10 years ago
- ☆16Updated 5 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆28Updated 3 years ago
- ☆15Updated 4 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis