indetectables-net / toolkitLinks
The essential toolkit for reversing, malware analysis, and cracking
☆909Updated 2 months ago
Alternatives and similar repositories for toolkit
Users that are interested in toolkit are comparing it to the libraries listed below
Sorting:
- All-in-One malware analysis tool.☆1,654Updated last week
- Collection of various malicious functionality to aid in malware development☆1,729Updated last year
- A utility for playing with cryptography, geared towards ransomware analysis.☆300Updated 2 weeks ago
- Collection of forensic tools☆657Updated 3 months ago
- ☆371Updated this week
- EDR Lab for Experimentation Purposes☆1,337Updated last month
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆772Updated 2 years ago
- Centralized resource for listing and organizing known injection techniques and POCs☆615Updated last month
- Now You See Me, Now You Don't☆972Updated last week
- Some of my publicly available Malware analysis and Reverse engineering.☆823Updated last year
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,103Updated this week
- This is a repository of resource about Malware techniques☆809Updated 2 years ago
- Nidhogg is an all-in-one simple to use windows kernel rootkit.☆2,071Updated last week
- A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analys…☆382Updated 7 months ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,273Updated 2 months ago
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.☆826Updated last year
- Malware Development for Ethical Hackers, published by Packt☆364Updated 9 months ago
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,047Updated last year
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities☆681Updated 10 months ago
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆668Updated last year
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆371Updated this week
- A centralized and enhanced memory analysis platform☆489Updated last month
- Living Off The Land Drivers☆1,271Updated this week
- Fully decrypt App-Bound Encrypted (ABE) cookies, passwords & payment methods from Chromium-based browsers (Chrome, Brave, Edge) - all in …☆934Updated this week
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆671Updated last month
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆897Updated 4 years ago
- Win32 and Kernel abusing techniques for pentesters☆961Updated last year
- TeleTracker is a simple set of Python scripts designed for anyone investigating Telegram channels. It helps you send messages quickly and…☆465Updated last year
- Complete list of LPE exploits for Windows (starting from 2023)☆828Updated 2 weeks ago
- Because AV evasion should be easy.☆791Updated 9 months ago