jeremybeaume / tools
Somes tools and scripts
☆143Updated 3 years ago
Alternatives and similar repositories for tools:
Users that are interested in tools are comparing it to the libraries listed below
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performs…☆165Updated 8 months ago
- A ProcessMonitor visualization application written in rust.☆176Updated last year
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆147Updated last week
- A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analys…☆291Updated 10 months ago
- A collection of tools, scripts and personal research☆120Updated 6 months ago
- A PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to …☆283Updated last year
- An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.☆261Updated 2 years ago
- Important notes and topics on my journey towards mastering Windows Internals☆357Updated 8 months ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆303Updated 4 months ago
- ☆196Updated 2 months ago
- A solution to create obfuscated reverse shells for PowerShell.☆71Updated 2 years ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆155Updated this week
- A collection of small scripts and tools for deobfuscation and malware analysis.☆65Updated last year
- A list of useful tools for Malware Analysis (will be updated regularly)☆134Updated 4 months ago
- The Windows Malware Analysis Reversing Core Tools☆90Updated 4 years ago
- Analyse your malware to surgically obfuscate it☆435Updated this week
- ☆131Updated last year
- ☆154Updated last year
- ☆115Updated 9 months ago
- A POC to disable TamperProtection and other Defender / MDE components☆194Updated 7 months ago
- A new AMSI Bypass technique using .NET ALI Call Hooking.☆186Updated 2 years ago
- ☆128Updated last year
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆54Updated 4 months ago
- Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.☆234Updated 2 months ago
- ☆296Updated 2 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆222Updated 10 months ago
- ☆185Updated 11 months ago
- Code snips and notes☆134Updated 2 years ago
- ☆174Updated 4 months ago