whichbuffer / Antidebug
Defeating Anti-Debugging Techniques for Malware Analysis
☆13Updated 2 years ago
Alternatives and similar repositories for Antidebug:
Users that are interested in Antidebug are comparing it to the libraries listed below
- ☆24Updated 2 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- ☆12Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- ☆22Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- Collection of generic YARA rules☆15Updated 9 months ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated last year
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- ☆34Updated 2 years ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆48Updated last year
- A collection of my presentation materials.☆16Updated 10 months ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 2 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- ☆18Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Updated 2 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 8 months ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- ☆25Updated 4 months ago
- My nim learning experiments☆11Updated 2 years ago
- Continuous kerberoast monitor☆44Updated last year
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Updated 2 years ago
- Sources Codes of many Office Malwares☆16Updated 2 years ago
- My malware analysis code snippets☆27Updated last year
- ☆22Updated 10 months ago