jeremybeaume / tools
Somes tools and scripts
☆147Updated 3 years ago
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performs…☆187Updated last year
- A ProcessMonitor visualization application written in rust.☆179Updated last year
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆162Updated last month
- http://moaistory.blogspot.com/2018/10/winsearchdbanalyzer.html☆122Updated 9 months ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆177Updated this week
- Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.☆243Updated 6 months ago
- A PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to …☆294Updated 2 years ago
- ☆201Updated 6 months ago
- ☆132Updated last year
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆457Updated 3 years ago
- A list of useful tools for Malware Analysis (will be updated regularly)☆141Updated 8 months ago
- A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analys…☆351Updated 3 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆239Updated last month
- ☆159Updated last year
- Important notes and topics on my journey towards mastering Windows Internals☆383Updated last year
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆357Updated 2 years ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆310Updated 8 months ago
- Dump quarantined files from Windows Defender☆63Updated 3 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆54Updated last year
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆311Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆186Updated 2 months ago
- An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.☆269Updated 2 years ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆177Updated 2 months ago
- Killing your preferred antimalware by abusing native symbolic links and NT paths.☆360Updated 3 years ago
- Finding secrets in kernel and user memory☆115Updated last year
- ☆572Updated 2 weeks ago
- A proof-of-concept for (CVE-2023-38840) that extracts plaintext master passwords from a locked Bitwarden vault.☆40Updated last year
- ☆352Updated last year
- A collection of tools, scripts and personal research☆128Updated last month
- Conti Locker source code☆191Updated 3 years ago