petikvx / malwares-analysis-tools
☆15Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for malwares-analysis-tools
- Sources Codes of many MSIL malwares☆22Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆20Updated last month
- Process injection via KernelCallbackTable☆14Updated 2 years ago
- ☆18Updated last year
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 2 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 2 years ago
- using the Recycle Bin to insure persistence☆11Updated 2 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Updated 2 years ago
- Tool for obtaining information about PPL processes☆17Updated 9 months ago
- A collection of Vulnerable Windows Drivers☆16Updated 2 years ago
- RDP THIEF - inject dll to remote desktop process (mstsc.exe) and steal user credentials.☆13Updated 3 years ago
- A simple PE loader.☆25Updated last year
- A utility that can be used to launch an executable with a DLL injected☆19Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated last year
- ☆14Updated last year
- Collection of IDA helpers☆15Updated 2 years ago
- ☆12Updated 2 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- Help deobfuscate VBScript☆15Updated 2 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆9Updated 2 years ago
- Using Thread Description To Hide Shellcodes☆13Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- Loading and executing shellcode in C# without PInvoke.☆21Updated 2 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆23Updated 4 months ago
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆10Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆11Updated last year
- A PE morphing tool that allows you to mimic one executable file to another.☆11Updated 11 months ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago