indetectables-net / toolkitLinks
The essential toolkit for reversing, malware analysis, and cracking
☆888Updated 2 weeks ago
Alternatives and similar repositories for toolkit
Users that are interested in toolkit are comparing it to the libraries listed below
Sorting:
- A utility for playing with cryptography, geared towards ransomware analysis.☆297Updated 4 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,187Updated last year
- Nidhogg is an all-in-one simple to use windows kernel rootkit.☆2,012Updated 2 months ago
- Now You See Me, Now You Don't☆949Updated 5 months ago
- EDR Lab for Experimentation Purposes☆1,276Updated last month
- Collection of various malicious functionality to aid in malware development☆1,681Updated last year
- Collection of forensic tools☆640Updated last month
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆771Updated 2 years ago
- Because AV evasion should be easy.☆749Updated 6 months ago
- This is a repository of resource about Malware techniques☆802Updated 2 years ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆951Updated 3 weeks ago
- All-in-One malware analysis tool.☆1,616Updated 2 months ago
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,127Updated last year
- Centralized resource for listing and organizing known injection techniques and POCs☆583Updated last month
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆982Updated 2 years ago
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.☆811Updated 11 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆2,841Updated 2 months ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,247Updated 7 months ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,224Updated last week
- Converts a EXE into DLL☆1,326Updated last month
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆911Updated 3 years ago
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆640Updated last year
- Complete list of LPE exploits for Windows (starting from 2023)☆798Updated last week
- x64 Dynamic Reverse Engineering Toolkit☆690Updated 2 years ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,673Updated 7 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆397Updated last week
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities☆669Updated 8 months ago
- Living Off The Land Drivers☆1,206Updated last month
- A modern 32/64-bit position independent implant template☆1,227Updated 3 months ago
- Some of my publicly available Malware analysis and Reverse engineering.☆814Updated last year