petikvx / malwares-analysis-toolsLinks
☆20Updated 3 years ago
Alternatives and similar repositories for malwares-analysis-tools
Users that are interested in malwares-analysis-tools are comparing it to the libraries listed below
Sorting:
- Some ELF Malwares☆10Updated 3 years ago
- Sources Codes of many MSIL malwares☆24Updated 3 years ago
- Source Code of MSIL Ransom☆14Updated 2 years ago
- Sources Codes of many Office Malwares☆17Updated 3 years ago
- ☆34Updated last year
- Help deobfuscate VBScript☆16Updated 3 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- Collection of my own detection rules☆20Updated 4 months ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- A collection of my presentation materials.☆17Updated last year
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆29Updated 3 years ago
- Collection of generic YARA rules☆16Updated 3 months ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆17Updated 2 years ago
- General malware analysis stuff☆37Updated last year
- Another Portable Executable files analysing stuff☆21Updated 14 years ago
- Collaborative malware exchange repository.☆33Updated last year
- Simple and efficient file shredding☆14Updated 6 years ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆18Updated 6 months ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆28Updated 7 months ago
- ☆17Updated 6 months ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Updated last year
- ☆25Updated 3 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Updated 2 months ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- Loading and executing shellcode in C# without PInvoke.☆22Updated 3 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Updated 2 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 3 years ago