nybble04 / Shady-HookLinks
Proof of Concept - Hooking API calls of a Ransomware
☆28Updated 4 years ago
Alternatives and similar repositories for Shady-Hook
Users that are interested in Shady-Hook are comparing it to the libraries listed below
Sorting:
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago
- ☆62Updated last year
- Parsers for custom malware formats ("Funky malware formats")☆96Updated 3 years ago
- ☆71Updated last year
- Enumerate Windows Defender threat families and dump their names according category☆90Updated 6 years ago
- A small library helping to parse commandline parameters (for C/C++)☆57Updated last month
- ☆22Updated 4 years ago
- Capa analysis importer for Ghidra.☆61Updated 4 years ago
- Rekall Memory Forensic Framework☆32Updated 5 years ago
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- The following repository contains a modified version of SUNBURST with cracekd hashes, comments and annotations.☆56Updated 4 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆91Updated 6 years ago
- Small visualizator for PE files☆69Updated last year
- API Logger for Windows Executables☆78Updated 4 years ago
- A collection of empty MSVC projects, compiled using various versions and configurations of Visual Studio.☆32Updated last year
- Set of antianalysis techniques found in malware☆132Updated last year
- Metadata hash incorporating the Rich Header for robustness against packing and other malware tricks☆65Updated 3 years ago
- Demos and presentation from SECArmy Village Grayhat 2020☆38Updated 2 years ago
- DLL Injection Library & Tools☆71Updated 9 years ago
- CallMon is an experimental system call monitoring tool that works on Windows 10 versions 2004+ using PsAltSystemCallHandlers☆145Updated 4 years ago
- PoC designed to evade userland-hooking anti-virus.☆88Updated 6 years ago
- DotNext 2019 St. Petersburg Talk Demos☆40Updated 6 years ago
- Parse .NET executable files.☆76Updated this week
- This tool is the result of a reverse engineering process of the Windows service called SysMain. Time to interact with the prefetch files …☆31Updated 4 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆43Updated 4 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- My collection of unpackers for malware packers/crypters☆28Updated 7 years ago
- A ready-made template for a project based on libpeconv.☆49Updated 4 months ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆123Updated 4 years ago
- Sysmon shenanigans☆66Updated 4 years ago