marcusbotacin / DropperLinks
Embed an executable as a PE resource, drops and launches it in runtime.
☆60Updated 3 years ago
Alternatives and similar repositories for Dropper
Users that are interested in Dropper are comparing it to the libraries listed below
Sorting:
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆106Updated 4 months ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆116Updated 11 months ago
- ☆28Updated 3 years ago
- Compile shellcode into an exe file from Windows or Linux.☆68Updated 2 weeks ago
- Red Team Operation's Defense Evasion Technique.☆53Updated last year
- ☆52Updated 8 months ago
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆61Updated last year
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆83Updated last year
- Framework for Adversarial Malware Evaluation.☆34Updated 2 months ago
- ☆96Updated 3 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆93Updated this week
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆100Updated last year
- ☆114Updated 2 years ago
- Small visualizator for PE files☆69Updated last year
- ☆27Updated 7 months ago
- The AMSI server for Avred☆29Updated last year
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆47Updated last year
- Detect strange memory regions and DLLs☆184Updated 3 years ago
- IDA Pro plugin to aid with the analysis of native IIS modules☆18Updated 10 months ago
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆62Updated 2 years ago
- Piece of code to detect and remove hooks in IAT☆64Updated 3 years ago
- OFFZONE 2024 Malware Persistence workshop☆19Updated 6 months ago
- 2022 Updated Kernelmode-Code☆32Updated last year
- Small PoC of using a Microsoft signed executable as a lolbin.☆138Updated 2 years ago
- Windows API Hashes used in the malwares☆42Updated 9 years ago
- Finding secrets in kernel and user memory☆116Updated last year
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆123Updated 2 years ago
- API Hammering with C++20☆46Updated 2 years ago