indetectables-net / toolkitLinks
The essential toolkit for reversing, malware analysis, and cracking
☆882Updated this week
Alternatives and similar repositories for toolkit
Users that are interested in toolkit are comparing it to the libraries listed below
Sorting:
- AV/EDR Evasion Lab for Training & Learning Purposes☆1,261Updated last month
- Collection of forensic tools☆635Updated last month
- A utility for playing with cryptography, geared towards ransomware analysis.☆290Updated 3 months ago
- Collection of various malicious functionality to aid in malware development☆1,669Updated last year
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆889Updated last week
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆766Updated last year
- Complete list of LPE exploits for Windows (starting from 2023)☆790Updated last month
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,210Updated 6 months ago
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.☆810Updated 11 months ago
- This is a repository of resource about Malware techniques☆797Updated 2 years ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,196Updated 4 months ago
- Because AV evasion should be easy.☆730Updated 6 months ago
- Nidhogg is an all-in-one simple to use windows kernel rootkit.☆1,995Updated last month
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,184Updated last year
- Now You See Me, Now You Don't☆944Updated 5 months ago
- kill anti-malware protected processes ( BYOVD) ( Microsoft Won)☆945Updated last year
- Real fucking shellcode encryptor & obfuscator tool☆894Updated 3 weeks ago
- Centralized resource for listing and organizing known injection techniques and POCs☆515Updated last week
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆389Updated 8 months ago
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆909Updated 3 years ago
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,111Updated last year
- A modern 32/64-bit position independent implant template☆1,222Updated 2 months ago
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆642Updated last year
- CVE-2023-38831 winrar exploit generator☆788Updated last year
- Win32 and Kernel abusing techniques for pentesters☆954Updated last year
- x64 Dynamic Reverse Engineering Toolkit☆659Updated 2 years ago
- x64 binary obfuscator☆1,838Updated last year
- ☆363Updated this week
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,009Updated 10 months ago
- Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package. Windows ON…☆642Updated last month