| LordNoteworthy/al-khaser |
5,313 |
|
0 |
0 |
about 2 years ago |
0 |
|
37 |
gpl-2.0 |
C++ |
| Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection. |
| swwwolf/wdbgark |
412 |
|
0 |
0 |
about 8 years ago |
0 |
|
1 |
other |
C++ |
| WinDBG Anti-RootKit Extension |
| conix-security/zer0m0n |
246 |
|
0 |
0 |
almost 11 years ago |
0 |
|
5 |
gpl-3.0 |
C |
| zer0m0n driver for cuckoo sandbox |
| gleeda/memtriage |
180 |
|
0 |
0 |
over 5 years ago |
0 |
|
1 |
|
Python |
| Allows you to quickly query a Windows machine for RAM artifacts |
| PI-Defender/pi-defender |
107 |
|
0 |
0 |
over 3 years ago |
0 |
|
1 |
lgpl-3.0 |
C++ |
| Kernel Security driver used to block past, current and future process injection techniques on Windows Operating System. |
| 4B4DB4B3/B4DB4B3-RAT |
46 |
|
0 |
0 |
almost 5 years ago |
0 |
|
2 |
mit |
C++ |
| Program for remote computer management with Telegram on native C++ - by B4DB4B3 |
| psmitty7373/eif |
30 |
|
0 |
0 |
over 7 years ago |
0 |
|
0 |
|
C++ |
| Evil Reflective DLL Injection Finder |
| nsacyber/Driver-Collider |
24 |
|
0 |
0 |
over 8 years ago |
0 |
|
0 |
other |
C |
| Blocks drivers from loading by using a name collision technique. #nsacyber |
| 7eRoM/elam |
12 |
|
0 |
0 |
over 4 years ago |
0 |
|
0 |
|
C |
| A Practical example of ELAM (Early Launch Anti-Malware) |