whichbuffer / Antidebug
Defeating Anti-Debugging Techniques for Malware Analysis
☆13Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Antidebug
- ☆22Updated 2 years ago
- ☆12Updated 2 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 3 years ago
- Collection of generic YARA rules☆14Updated 4 months ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆19Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆22Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Extension functionality for the NightHawk operator client☆26Updated last year
- ☆18Updated 7 months ago
- ☆21Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Collection of Malware Lures☆23Updated 3 years ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆41Updated last year
- Identifies metadata of .NET binary files.☆21Updated 7 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 3 months ago
- A collection of my presentation materials.☆16Updated 6 months ago
- My nim learning experiments☆11Updated 2 years ago
- Tricard - Malware Sandbox Fingerprinting☆19Updated 10 months ago
- Repository for LNK stuff☆27Updated 2 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆18Updated last year
- Modular malware analysis artifact collection and correlation framework☆52Updated 6 months ago
- Tools for offensive security of NetBackup infrastructures☆38Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Updated 2 years ago
- ☆26Updated 3 months ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆30Updated last year
- ☆31Updated 2 years ago
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Updated last year