mgeeky / msidump
MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.
☆208Updated last year
Alternatives and similar repositories for msidump:
Users that are interested in msidump are comparing it to the libraries listed below
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆324Updated 9 months ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆310Updated last year
- Finding secrets in kernel and user memory☆115Updated last year
- A ProcessMonitor visualization application written in rust.☆178Updated last year
- ☆116Updated last year
- Aims to identify sleeping beacons☆585Updated 4 months ago
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆166Updated last year
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆142Updated 9 months ago
- Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows☆207Updated 2 years ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆357Updated 2 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆165Updated 3 weeks ago
- ETW based POC to identify direct and indirect syscalls☆185Updated 2 years ago
- Tools and PoCs for Windows syscall investigation.☆359Updated 3 months ago
- Kill AV/EDR leveraging BYOVD attack☆351Updated last year
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆106Updated 2 months ago
- Beacon Object File Loader☆286Updated last year
- EDRSandblast-GodFault☆260Updated last year
- ☆183Updated 2 years ago
- Run Your Payload Without Running Your Payload☆181Updated 2 years ago
- POC for frustrating/defeating Malware Analysts☆154Updated 2 years ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆335Updated 2 months ago
- Extract C2 Traffic☆248Updated 4 months ago
- ☆298Updated 5 months ago
- Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime☆304Updated last year
- Native Syscalls Shellcode Injector☆266Updated last year
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆171Updated 2 years ago
- different ntdll unhooking techniques : unhooking ntdll from disk, from KnownDlls, from suspended process, from remote server (fileless)☆188Updated last year
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆319Updated 2 years ago
- Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC☆176Updated 2 years ago
- Tools for analyzing EDR agents☆229Updated 10 months ago