mgeeky / msidump
MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.
☆205Updated last year
Alternatives and similar repositories for msidump:
Users that are interested in msidump are comparing it to the libraries listed below
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆308Updated last year
- Finding secrets in kernel and user memory☆115Updated last year
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆323Updated 8 months ago
- POC for frustrating/defeating Malware Analysts☆154Updated 2 years ago
- Native Syscalls Shellcode Injector☆265Updated last year
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆319Updated 2 years ago
- Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows☆203Updated 2 years ago
- EDRSandblast-GodFault☆257Updated last year
- ☆113Updated last year
- ☆182Updated 2 years ago
- ☆296Updated 4 months ago
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆156Updated last month
- Run Your Payload Without Running Your Payload☆180Updated 2 years ago
- ☆112Updated 2 years ago
- Kill AV/EDR leveraging BYOVD attack☆343Updated last year
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆139Updated 8 months ago
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆165Updated last year
- ☆219Updated last year
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆357Updated 2 years ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆335Updated last month
- ETW based POC to identify direct and indirect syscalls☆181Updated last year
- ☆92Updated last year
- Aims to identify sleeping beacons☆571Updated 3 months ago
- Simple EDR implementation to demonstrate bypass☆171Updated 4 years ago
- Tools and PoCs for Windows syscall investigation.☆359Updated 2 months ago
- Execute shellcode files with rundll32☆191Updated last year
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆269Updated last year
- Tools for analyzing EDR agents☆221Updated 9 months ago
- Fully modular persistence framework☆251Updated last year
- ☆274Updated last year