nybble04 / Shady-HookLinks
Proof of Concept - Hooking API calls of a Ransomware
☆28Updated 4 years ago
Alternatives and similar repositories for Shady-Hook
Users that are interested in Shady-Hook are comparing it to the libraries listed below
Sorting:
- Parsers for custom malware formats ("Funky malware formats")☆97Updated 3 years ago
- ☆23Updated 4 years ago
- ☆72Updated 2 years ago
- API Logger for Windows Executables☆79Updated 4 years ago
- Ghidra plugin for https://analyze.intezer.com☆72Updated 2 years ago
- Set of antianalysis techniques found in malware☆131Updated 2 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago
- Enumerate Windows Defender threat families and dump their names according category☆91Updated 6 years ago
- ☆106Updated 6 years ago
- ShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solution…☆216Updated 3 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆99Updated 4 years ago
- Process Hollowing for 32 bit and 64 bit☆79Updated 7 years ago
- Capa analysis importer for Ghidra.☆62Updated 4 years ago
- ☆29Updated 7 years ago
- Metadata hash incorporating the Rich Header for robustness against packing and other malware tricks☆68Updated 4 years ago
- Driver Initial Reconnaissance Tool☆123Updated 5 years ago
- MalUnpack companion driver☆99Updated last year
- PoC designed to evade userland-hooking anti-virus.☆90Updated 6 years ago
- ☆136Updated 6 months ago
- CallMon is an experimental system call monitoring tool that works on Windows 10 versions 2004+ using PsAltSystemCallHandlers☆147Updated 5 years ago
- A simple API monitor for Windbg☆63Updated 8 years ago
- A C/C++ implementation of Microsoft's Antimalware Scan Interface☆182Updated 7 years ago
- DotNext 2019 St. Petersburg Talk Demos☆39Updated 6 years ago
- An Open Source Windows DLL Injector With All Known Techniques Available☆87Updated 7 years ago
- Inject code into a legitimate process☆145Updated 10 years ago
- Extract labels from IDA, Ghidra, Binary Ninja, and Relyze files and export x64dbg database. Including radare2 main address.☆113Updated last year
- FileInsight-plugins: decoding toolbox of McAfee FileInsight hex editor for malware analysis☆162Updated 9 months ago
- The following repository contains a modified version of SUNBURST with cracekd hashes, comments and annotations.☆56Updated 4 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆123Updated 5 years ago
- Plugin for x64dbg to generate Yara rules from function basic blocks.☆37Updated 8 years ago