Portable Executable (PE) library written in .Net
-
Updated
May 27, 2024 - C#
Portable Executable (PE) library written in .Net
.NET runtime inspector
Research on code virtualization in .NET [WIP]
Easy-as-dumb toolkit to prevent any malicious injections in your Android app. Beware of cheaters!
A C# based tool for analysing malicious OneNote documents
A tool for extracting contents (assemblies, configuration, etc.) from a single-file application to a directory, suitable for purposes like malware analysis.
A simple utility to list all methods of a given .NET Assembly and to invoke them
PoC Windows Usermode Rootkit made in C# and C++, made to show you how to protect your process using hooking.
Analyzers for Portable Executable anomalies and other malware behavior.
Defanger is a Notepad++ plugin that defangs/refangs malicious IOCs.
SpyCore - Windows Malicious FIle Scanner (Distributes)
Tool to decrypt the configuration of NanoCore and dump all used plugins
Resources for DFIR Professionals Responding to the Whispergate
View and edit Portable Exexutable (PE) files.
This tool backs up all downloaded files during the malware execution period and helps the dynamic malware analysis process.
Penetrum LLC opensource Threat Intel. All information is also available at https://penetrum.com
Safe virtual drive which prevent threats being executed
Simple RAT used for controlling Windows machines, made in C# .NET 6 (Made for educational purposes only).
Configuration extraction tool for XWorm RAT Client. Tested on XWorm 3.1.
A C# client for Vertex Synapse
Add a description, image, and links to the malware-analysis topic page so that developers can more easily learn about it.
To associate your repository with the malware-analysis topic, visit your repo's landing page and select "manage topics."