n1ght-w0lf / MalwareAnalysisLinks
My malware analysis code snippets
☆28Updated 2 years ago
Alternatives and similar repositories for MalwareAnalysis
Users that are interested in MalwareAnalysis are comparing it to the libraries listed below
Sorting:
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 3 years ago
- Code snippets for Qiling Tutorials☆21Updated 5 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 4 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Updated 2 months ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Updated 3 years ago
- An injector that use PT_LOAD technique☆12Updated 3 years ago
- ☆22Updated last year
- Identifies metadata of .NET binary files.☆21Updated last year
- Progress of learning kernel development☆13Updated 3 years ago
- Help deobfuscate VBScript☆17Updated 3 years ago
- ☆18Updated 11 months ago
- ☆17Updated 2 years ago
- ☆26Updated 3 years ago
- A collection of various exploits☆28Updated last year
- Sources Codes of many Office Malwares☆17Updated 3 years ago
- ☆27Updated last year
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆38Updated last year
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Updated 3 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated 11 months ago
- x64 Windows package of the shellcode2exe tool☆14Updated 5 years ago
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆25Updated 4 years ago
- Tricard - Malware Sandbox Fingerprinting☆22Updated last year
- IoT Malware Similarity Analysis Platform☆45Updated 3 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated 2 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- ☆37Updated 9 months ago
- Simple POC of Voice C2 using Speech Recognition☆13Updated 3 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Updated 3 weeks ago
- ☆34Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago