mgeeky / msidumpLinks
MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.
☆214Updated 2 years ago
Alternatives and similar repositories for msidump
Users that are interested in msidump are comparing it to the libraries listed below
Sorting:
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆315Updated last year
- Finding secrets in kernel and user memory☆116Updated last year
- A collection of tools and detections for the Sliver C2 Frameworj☆128Updated 2 years ago
- A ProcessMonitor visualization application written in rust.☆181Updated 2 years ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆156Updated last year
- Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows☆216Updated 2 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆173Updated last month
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆333Updated last year
- ☆118Updated last year
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆107Updated 5 months ago
- Extract C2 Traffic☆249Updated 8 months ago
- Native Syscalls Shellcode Injector☆267Updated 2 years ago
- Tools for analyzing EDR agents☆238Updated last year
- ETW based POC to identify direct and indirect syscalls☆187Updated 2 years ago
- ☆113Updated 3 years ago
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆164Updated 2 years ago
- Tools and PoCs for Windows syscall investigation.☆361Updated last month
- Detect strange memory regions and DLLs☆185Updated 3 years ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆358Updated 2 years ago
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆167Updated 4 months ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Updated 11 months ago
- Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC☆177Updated 3 years ago
- Run Your Payload Without Running Your Payload☆180Updated 2 years ago
- ☆185Updated 2 years ago
- Execute PowerShell code at the antimalware-light protection level.☆141Updated 2 years ago
- EDRSandblast-GodFault☆266Updated last year
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆178Updated 2 years ago
- Leaked Windows processes handles identification tool☆288Updated 3 years ago
- ☆300Updated 9 months ago
- POC for frustrating/defeating Malware Analysts☆156Updated 3 years ago