secana / PeNet-AnalyzerLinks
Analyzers for Portable Executable anomalies and other malware behavior.
☆32Updated last year
Alternatives and similar repositories for PeNet-Analyzer
Users that are interested in PeNet-Analyzer are comparing it to the libraries listed below
Sorting:
- Sources Codes of many MSIL malwares☆24Updated 2 years ago
- Dump certificates from PE files in different formats☆38Updated last year
- Example of C# heap injector for x64 and x86 shellcodes☆14Updated 2 years ago
- The evolution of NxRansomware☆10Updated 6 years ago
- a small wiper malware programmed in c#☆58Updated 2 years ago
- Learning Process Injection and Hollowing techniques☆41Updated 3 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- RATs library 2003 to present☆14Updated last year
- Unpacker and Config Extractor for managed Redline Stealer payloads☆42Updated 2 years ago
- Get-UnJlaive is tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.☆22Updated 3 years ago
- Source Code of MSIL Ransom☆14Updated 2 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆39Updated 4 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- Easy XOR string encryption for NET based binaries☆139Updated last year
- Collection of various WINAPI tricks / features used or abused by Malware☆13Updated 3 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Updated 3 years ago
- Simple way to disable/rename buttons from a task manager☆30Updated 5 years ago
- A .NET binary loader that bypasses AMSI☆46Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated last year
- ☆33Updated last year
- Remote command shell application written in C# targeting the .NET 9.0 runtime.☆30Updated 6 months ago
- General malware analysis stuff☆37Updated 10 months ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- reverse engineering random malwares☆23Updated 5 months ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM☆57Updated 2 years ago
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆77Updated 2 years ago