open source malware analysis and research notes dump
☆26Aug 30, 2023Updated 2 years ago
Alternatives and similar repositories for open_mal_analysis_notes
Users that are interested in open_mal_analysis_notes are comparing it to the libraries listed below
Sorting:
- ☆17Feb 29, 2020Updated 6 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- ☆19Jul 29, 2022Updated 3 years ago
- A collection of my reverse engineering and malware analysis write-ups☆21Dec 11, 2020Updated 5 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- IOCs for CRASHOVERRIDE malware framework☆27Jun 15, 2017Updated 8 years ago
- Simple code to resolve library functions at runtime☆10Jan 5, 2015Updated 11 years ago
- ☆15Feb 22, 2021Updated 5 years ago
- My collection of unpackers for malware packers/crypters☆28Aug 24, 2017Updated 8 years ago
- A small utility to run raw code chunks in the executable memory area.☆15Feb 6, 2015Updated 11 years ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆48Jun 21, 2022Updated 3 years ago
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago
- Utilities for the memory forensics framework☆22Jul 31, 2018Updated 7 years ago
- ☆20Jul 9, 2019Updated 6 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- Reverse Windows shell over TLS☆19Mar 3, 2016Updated 10 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- x64 Assembly Examples (fasm)☆30Feb 20, 2017Updated 9 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Anything ( :-) ) you can do with a MS-Windows file (but faster)☆15Nov 23, 2023Updated 2 years ago
- A simple native code virtualizer for 32-bit Windows PE☆15Jan 13, 2016Updated 10 years ago
- A Simple AES Command Line Crypter☆39Jan 19, 2023Updated 3 years ago
- Auto phishing form-based websites☆10Feb 20, 2020Updated 6 years ago
- Wrapper for VMProtect Library (only MSVC)☆35Jul 6, 2018Updated 7 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Collection of ezine about virii☆17Sep 13, 2022Updated 3 years ago
- Мутация PE x86☆16Jun 2, 2019Updated 6 years ago
- Shared Obfuscation Headers☆15Apr 20, 2019Updated 6 years ago