sakkiii / MultiAV2Links
MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling
☆69Updated last year
Alternatives and similar repositories for MultiAV2
Users that are interested in MultiAV2 are comparing it to the libraries listed below
Sorting:
- MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling☆21Updated 4 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆75Updated 4 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆177Updated 3 months ago
- ProcDot Malware Sandbox☆25Updated 4 months ago
- Petaq - Purple Team Command & Control Server☆104Updated 3 years ago
- (kinda) Malicious Outlook Reader☆136Updated 4 years ago
- Lazarus analysis tools and research report☆57Updated last year
- (Sim)ulate (Ba)zar Loader☆29Updated 5 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 3 years ago
- My Malware Analysis Reports☆24Updated 3 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Updated 3 years ago
- ☆66Updated 2 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago
- C# Desktop GUI application that either performs YARA scan locally or prepares the scan in Active Directory domain environment with a few …☆35Updated 4 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆102Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Unpacking and decryption tools for the Emotet malware☆45Updated 4 years ago
- This repository stores the proof-of-concept of Windows malware categorized with MITRE ATT&CK.☆14Updated last year
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆68Updated 3 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Updated 5 years ago
- AmsiHook is a project I created to figure out a bypass to AMSI via function hooking.☆66Updated 5 years ago
- This is a repository that is meant to hold detections for various process injection techniques.☆34Updated 5 years ago
- Python wrappers for mal_unpack☆37Updated 2 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 3 years ago
- A small utility to deal with malware embedded hashes.☆52Updated 2 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated 2 years ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated 2 years ago
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆144Updated 4 years ago
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆75Updated 4 years ago