robindimyan / MalwareVulnerabilitiesExposuresLinks
Malware vulnerability research. Coming soon..
☆12Updated 5 years ago
Alternatives and similar repositories for MalwareVulnerabilitiesExposures
Users that are interested in MalwareVulnerabilitiesExposures are comparing it to the libraries listed below
Sorting:
- ☆50Updated 5 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- ☆23Updated 4 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 5 years ago
- open source malware analysis and research notes dump☆26Updated 2 years ago
- ☆31Updated 5 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆37Updated 10 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 8 years ago
- A repository where I share my injection implemintations☆29Updated 5 years ago
- ☆16Updated 4 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 7 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- A small library helping to parse commandline parameters (for C/C++)☆58Updated 5 months ago
- ☆24Updated 6 years ago
- Antivirus Emulator Fingerprints☆29Updated 7 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 7 years ago
- ☆21Updated 5 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- ☆23Updated 5 years ago
- ☆37Updated 6 years ago
- Flare-On solutions☆37Updated 6 years ago
- ☆46Updated 6 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Updated 7 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Updated 4 years ago
- ☆36Updated 6 years ago
- The exploit for Panda AV LPE☆37Updated 6 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- ☆28Updated 6 years ago
- ☆45Updated 7 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆23Updated 5 years ago