malice-plugins / windows-defenderLinks
Malice Windows Defender AntiVirus Plugin
☆39Updated 2 years ago
Alternatives and similar repositories for windows-defender
Users that are interested in windows-defender are comparing it to the libraries listed below
Sorting:
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Updated 2 years ago
- ☆62Updated 5 years ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 4 years ago
- ☆54Updated 6 years ago
- A collection of tools to enumerate and analyse Windows DACLs☆108Updated 10 years ago
- A proof-of-concept subject interface package (SIP) used to demonstrate digital signature subversion attacks.☆99Updated 7 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago
- POSHSPY backdoor code☆43Updated 8 years ago
- a program to detect reflective dll injection on a live machine☆74Updated 9 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Updated 5 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- Remove individual lines from Windows Event Viewer Log (EVT) files☆45Updated 4 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆66Updated 8 years ago
- A Portable Executable parser for Golang☆47Updated 7 months ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆123Updated 4 years ago
- Simple DLL to test various injection methods.☆51Updated 4 years ago
- A collection of shellcode hashes☆17Updated 6 years ago
- Malice Office/OLE/RTF Plugin☆13Updated 6 years ago
- IBM RedCON 2020 - Throwing an AquaWrench into the Kernel☆44Updated 4 years ago
- CAPE monitor DLLs☆41Updated 5 years ago
- Static based decoders for malware samples☆93Updated 5 years ago
- Experiments on the Windows Internals☆30Updated 5 years ago
- PE file mapping and manipulation package.☆36Updated 3 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Collect autorun records from running system☆60Updated 3 years ago
- Some simple process injection techniques targeting the Windows platform☆31Updated 5 years ago
- Windows Stagers to circumvent restrictive network environments☆66Updated 10 months ago
- ☆50Updated 5 years ago