manyfacedllama / amsi-tracer
Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) passed into AMSI during dynamic execution.
☆89Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for amsi-tracer
- runsc loads 32/64 bit shellcode (depending on how runsc is compiled) in a way that makes it easy to load in a debugger. This code is base…☆36Updated last year
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆163Updated last year
- Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes.☆115Updated 2 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆60Updated 2 years ago
- Simple EDR implementation to demonstrate bypass☆159Updated 4 years ago
- ☆100Updated last year
- Use YARA rules on Time Travel Debugging traces☆86Updated last year
- A fake AMSI Provider which can be used for persistence.☆139Updated 3 years ago
- Experiment on reproducing Obfuscate & Sleep☆139Updated 3 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆42Updated last year
- Execute PowerShell code at the antimalware-light protection level.☆138Updated last year
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆97Updated last year
- Finding secrets in kernel and user memory☆113Updated last year
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆114Updated last year
- Userland API monitor for threat hunting☆55Updated 4 years ago
- ☆47Updated 4 years ago
- Malware Configuration Extraction Modules☆47Updated last year
- PE File Blessing - To continue or not to continue☆86Updated 5 years ago
- ☆61Updated 9 months ago
- Yara Rules for Modern Malware☆67Updated 8 months ago
- ☆27Updated 2 years ago
- Detect strange memory regions and DLLs☆171Updated 2 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Updated last year
- Repo containing my public talks☆22Updated last year
- Unpacking and decryption tools for the Emotet malware☆46Updated 2 years ago
- This tool is the result of a reverse engineering process of the Windows service called SysMain. Time to interact with the prefetch files …☆30Updated 4 years ago
- Simple PowerShell script to enable process scanning with Yara.☆90Updated 2 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆111Updated 4 months ago
- Windows user-land hooks manipulation tool.☆139Updated 3 years ago