mgeeky / msidumpLinks
MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.
☆222Updated 2 years ago
Alternatives and similar repositories for msidump
Users that are interested in msidump are comparing it to the libraries listed below
Sorting:
- Finding secrets in kernel and user memory☆115Updated 2 years ago
- A collection of tools and detections for the Sliver C2 Frameworj☆132Updated 2 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆180Updated 4 months ago
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆109Updated 9 months ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆318Updated 2 years ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆166Updated last year
- A ProcessMonitor visualization application written in rust.☆184Updated 2 years ago
- Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows☆217Updated 3 years ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆336Updated last year
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆198Updated last month
- Extract C2 Traffic☆253Updated 11 months ago
- ☆113Updated 3 years ago
- Native Syscalls Shellcode Injector☆266Updated 2 years ago
- ETW based POC to identify direct and indirect syscalls☆189Updated 2 years ago
- Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC☆179Updated 3 years ago
- ☆120Updated last year
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆170Updated 2 years ago
- Tools and PoCs for Windows syscall investigation.☆365Updated 5 months ago
- Retrieve inner payloads from Donut samples☆111Updated last year
- ☆233Updated 2 years ago
- Bypass Malware Sandbox Evasion Ram check☆139Updated 2 years ago
- ☆184Updated 2 years ago
- Detect strange memory regions and DLLs☆183Updated 3 years ago
- ☆301Updated last year
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆360Updated 2 years ago
- different ntdll unhooking techniques : unhooking ntdll from disk, from KnownDlls, from suspended process, from remote server (fileless)☆195Updated 2 years ago
- EDRSandblast-GodFault☆268Updated 2 years ago
- Configuration Extractors for Malware☆119Updated 6 months ago
- ☆227Updated 3 years ago
- A new AMSI Bypass technique using .NET ALI Call Hooking.☆192Updated 3 years ago