secana / PeNet-AnalyzerLinks
Analyzers for Portable Executable anomalies and other malware behavior.
☆33Updated last week
Alternatives and similar repositories for PeNet-Analyzer
Users that are interested in PeNet-Analyzer are comparing it to the libraries listed below
Sorting:
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆46Updated 5 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆50Updated 4 years ago
- Dump certificates from PE files in different formats☆38Updated 2 years ago
- Sources Codes of many MSIL malwares☆24Updated 3 years ago
- Easy XOR string encryption for NET based binaries☆140Updated 2 years ago
- Example of C# heap injector for x64 and x86 shellcodes☆14Updated 3 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆68Updated 2 years ago
- Get-UnJlaive is tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.☆22Updated 3 years ago
- a small wiper malware programmed in c#☆59Updated 3 years ago
- Learning Process Injection and Hollowing techniques☆42Updated 3 years ago
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆82Updated 3 years ago
- Source Code of MSIL Ransom☆14Updated 2 years ago
- Remote command shell application written in C# targeting the .NET runtime.☆29Updated last week
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆31Updated 3 years ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆41Updated 2 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- Collection of various WINAPI tricks / features used or abused by Malware☆13Updated 3 years ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- ☆37Updated 10 months ago
- ☆32Updated 2 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆111Updated 3 years ago
- A .NET binary loader that bypasses AMSI☆45Updated 4 years ago
- This module allows you to run a process (defaulting to PowerShell) as a different user by providing a known username and password. By def…☆99Updated 11 months ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated 2 years ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆66Updated 2 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- Obfuscator for batch script☆62Updated last year