Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware
☆58Aug 6, 2025Updated 6 months ago
Alternatives and similar repositories for hidden_bee_tools
Users that are interested in hidden_bee_tools are comparing it to the libraries listed below
Sorting:
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Apr 13, 2018Updated 7 years ago
- A set of small utilities, helpers for PIN tracers☆37Feb 15, 2026Updated 2 weeks ago
- Parsers for custom malware formats ("Funky malware formats")☆98Jan 8, 2022Updated 4 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- A wrapper for capstone for bearparser☆16Oct 8, 2025Updated 4 months ago
- A ready-made template for a project based on libpeconv.☆51Oct 31, 2025Updated 4 months ago
- A CMake template for projects using MS Detours☆23Feb 18, 2025Updated last year
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- Sample libraries to be used with IAT Patcher☆37Oct 1, 2022Updated 3 years ago
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆32Aug 12, 2022Updated 3 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆99Jun 24, 2021Updated 4 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆229Mar 22, 2023Updated 2 years ago
- Set of my small utils related to cryptography, encoding, decoding etc☆95Sep 1, 2025Updated 6 months ago
- Archive of ransomware decryptors☆34Dec 7, 2017Updated 8 years ago
- Converts a DLL into EXE☆816Jul 23, 2023Updated 2 years ago
- Rust crate to parse user-mode minidump files generated on Windows☆18Nov 17, 2025Updated 3 months ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆187Apr 22, 2025Updated 10 months ago
- ☆22Jul 10, 2020Updated 5 years ago
- Password scrambler - a deterministic password re-generator (alternative to a password manager)☆131Jan 2, 2023Updated 3 years ago
- My metasploit modules☆24Jan 8, 2016Updated 10 years ago
- Set of antianalysis techniques found in malware☆133Aug 25, 2023Updated 2 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆63Aug 21, 2024Updated last year
- Small visualizator for PE files☆70Sep 20, 2023Updated 2 years ago
- ☆24Apr 30, 2023Updated 2 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Feb 11, 2024Updated 2 years ago
- IFL - Interactive Functions List (plugin for IDA Pro)☆487Updated this week
- PoC exploit for late August 2018 Task Scheduler ALPC Vulnerability☆24Oct 10, 2019Updated 6 years ago
- ☆46Aug 15, 2021Updated 4 years ago
- A more stealthy variant of "DLL hollowing"☆363Mar 8, 2024Updated last year
- ☆76Nov 30, 2023Updated 2 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆23Aug 27, 2022Updated 3 years ago
- Enable EFS service as low priv user (PE & BOF)☆21Jul 6, 2025Updated 7 months ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 3 years ago
- Regular expression Search on the command-line☆16Mar 31, 2025Updated 11 months ago