mgeeky / msidumpLinks
MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.
☆213Updated 2 years ago
Alternatives and similar repositories for msidump
Users that are interested in msidump are comparing it to the libraries listed below
Sorting:
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆314Updated last year
- Finding secrets in kernel and user memory☆116Updated last year
- A ProcessMonitor visualization application written in rust.☆181Updated last year
- ☆119Updated last year
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆331Updated 11 months ago
- ETW based POC to identify direct and indirect syscalls☆187Updated 2 years ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆346Updated 4 months ago
- Detect strange memory regions and DLLs☆184Updated 3 years ago
- POC for frustrating/defeating Malware Analysts☆154Updated 3 years ago
- EDRSandblast-GodFault☆266Updated last year
- Collect Windows telemetry for Maldev☆356Updated 4 months ago
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆323Updated 2 years ago
- Native Syscalls Shellcode Injector☆267Updated last year
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆165Updated last year
- Exploitation of process killer drivers☆201Updated last year
- Kill AV/EDR leveraging BYOVD attack☆360Updated last year
- Python tool to check rootkits in Windows kernel☆197Updated 3 months ago
- ☆300Updated 7 months ago
- Beacon Object File Loader☆287Updated last year
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆358Updated 2 years ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆146Updated 11 months ago
- ☆217Updated 3 years ago
- Aims to identify sleeping beacons☆604Updated 6 months ago
- Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows☆216Updated 2 years ago
- Tools for analyzing EDR agents☆230Updated last year
- Weaponized HellsGate/SigFlip☆199Updated 2 years ago
- Extract C2 Traffic☆249Updated 6 months ago
- Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC☆177Updated 2 years ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆205Updated 2 years ago
- Tools and PoCs for Windows syscall investigation.☆361Updated 2 weeks ago