shaddy43 / MalwareAnalysisSeriesLinks
This repository contains the analysis reports, technical details or any tools created for helping in malware analysis. Additionally, the repo contains extracted TTPs with code along with the detection rules
☆22Updated 6 months ago
Alternatives and similar repositories for MalwareAnalysisSeries
Users that are interested in MalwareAnalysisSeries are comparing it to the libraries listed below
Sorting:
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Updated 10 months ago
- some leaked src code for known and unknown malwares☆22Updated 4 months ago
- POC of GITHUB simple C2 in rust☆52Updated 5 months ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆90Updated 8 months ago
- ☆164Updated 9 months ago
- Some of my Malware Analysis writeups☆48Updated 2 months ago
- ☆108Updated last year
- Red Teaming Tradecraft☆28Updated 3 years ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆135Updated this week
- Vibe Malware Triage - MCP server for static PE analysis.☆74Updated 3 weeks ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 9 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Updated 2 years ago
- ☆43Updated last year
- Configuration Extractors for Malware☆121Updated 8 months ago
- Windows Persistence IT-Security☆108Updated 9 months ago
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆110Updated 10 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆121Updated 7 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆78Updated last year
- Command and Control (C2) framework☆132Updated 7 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆90Updated 8 months ago
- Permanently disable EDRs as local admin☆123Updated last week
- Make an Linux Kernel rootkit visible again.☆59Updated 10 months ago
- Monarch - The Adversary Emulation Toolkit☆64Updated 11 months ago
- My projects to understand malware development and detection. Use responsibly. I'm not responsible if you cause unauthorised damage to any…☆101Updated 6 months ago
- Analyse MSI files for vulnerabilities☆140Updated last year
- Convert your shellcode into an ASCII string☆125Updated 6 months ago
- AppLocker-Based EDR Neutralization☆216Updated last week
- ☆39Updated last year
- ☆46Updated last month