secana / PeNet-Analyzer
Analyzers for Portable Executable anomalies and other malware behavior.
☆32Updated 8 months ago
Alternatives and similar repositories for PeNet-Analyzer:
Users that are interested in PeNet-Analyzer are comparing it to the libraries listed below
- a small wiper malware programmed in c#☆50Updated 2 years ago
- Learning Process Injection and Hollowing techniques☆41Updated 2 years ago
- Sources Codes of many MSIL malwares☆23Updated 2 years ago
- Collection of various WINAPI tricks / features used or abused by Malware☆13Updated 2 years ago
- A .NET binary loader that bypasses AMSI☆44Updated 3 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆25Updated 7 months ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆101Updated 2 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆24Updated 2 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆49Updated 3 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 2 years ago
- ☆22Updated 8 months ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆53Updated 2 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated last year
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆28Updated 2 years ago
- Dump certificates from PE files in different formats☆38Updated last year
- Loading and executing shellcode in C# without PInvoke.☆20Updated 3 years ago
- Example of C# heap injector for x64 and x86 shellcodes☆13Updated 2 years ago
- The evolution of NxRansomware☆10Updated 5 years ago
- CSharp4Pentesters☆12Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆23Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated last year
- Alleged source code leak of Osiris banking trojan☆37Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 2 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- Collection of my own detection rules☆15Updated last year
- This is a simple example of DLL hijacking enabling proxy execution.☆65Updated last year
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated last year
- A Multi-Threaded PE Export Collection Utility☆14Updated last year
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆20Updated 4 years ago