Defeating Anti-Debugging Techniques for Malware Analysis
☆12Oct 1, 2022Updated 3 years ago
Alternatives and similar repositories for Antidebug
Users that are interested in Antidebug are comparing it to the libraries listed below
Sorting:
- ☆35Dec 21, 2023Updated 2 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Jul 7, 2022Updated 3 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆59Dec 15, 2023Updated 2 years ago
- My malware analysis code snippets☆28Jul 15, 2023Updated 2 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆73Jan 26, 2024Updated 2 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- Python Library for ConfigExtractor☆15Updated this week
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Oct 10, 2022Updated 3 years ago
- ☆18Jun 25, 2024Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- My personal tech blog☆16Dec 13, 2024Updated last year
- Nemo - An offensive Remote Access Tool & Post-Exploitation Framework (WIP).☆14Apr 25, 2023Updated 2 years ago
- ☆18Sep 24, 2024Updated last year
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Jul 9, 2023Updated 2 years ago
- ☆27Jul 11, 2022Updated 3 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Sep 15, 2025Updated 5 months ago
- Writeups for CTF challenges☆35Nov 12, 2023Updated 2 years ago
- Bypass Malware Time Delays☆107Sep 23, 2022Updated 3 years ago
- Emulator for Windows Malware Analysis☆15Feb 26, 2022Updated 4 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆13Mar 22, 2022Updated 3 years ago
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Aug 19, 2025Updated 6 months ago
- Shellcode Loader / bypass *60、*rong☆16Dec 1, 2023Updated 2 years ago
- Windows Persistence Toolkit in C#☆36Sep 23, 2022Updated 3 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Nov 1, 2023Updated 2 years ago
- ☆19Jul 29, 2022Updated 3 years ago
- Duplicate not owned Token from Running Process☆74Jul 21, 2023Updated 2 years ago
- Powershell sandboxing utility☆19Feb 2, 2026Updated 3 weeks ago
- ☆17Jan 21, 2026Updated last month
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆44Jan 10, 2024Updated 2 years ago
- Configuration Extractors for Malware☆124Apr 23, 2025Updated 10 months ago
- Simple and sane compression wrapper library.☆19Oct 28, 2022Updated 3 years ago
- ☆18Dec 9, 2023Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Apr 4, 2023Updated 2 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago