mirror of
https://github.com/pe3zx/my-infosec-awesome.git
synced 2024-12-11 00:54:21 -05:00
Add katjahahn/PortEx
This commit is contained in:
parent
0e74b047c0
commit
ea44f8baf3
12
README.md
12
README.md
@ -441,14 +441,18 @@ My curated list of awesome links, resources and tools
|
||||
<td><a href="https://github.com/hasherezade/libpeconv/tree/master/run_pe">hasherezade/libpeconv/runpe</a></td>
|
||||
<td>RunPE (aka Process Hollowing) is a well known technique allowing to injecting a new PE into a remote processes, imprersonating this process. The given implementation works for PE 32bit as well as 64bit.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/LordNoteworthy/al-khaser">LordNoteworthy/al-khaser</a></td>
|
||||
<td>Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://iris-h.malwageddon.com/">IRIS-H</a></td>
|
||||
<td>IRIS-H is an online digital forensics tool that performs automated static analysis of files stored in a directory-based or strictly structured formats.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/katjahahn/PortEx">katjahahn/PortEx</a></td>
|
||||
<td>Java library to analyse Portable Executable files with a special focus on malware analysis and PE malformation robustness</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/LordNoteworthy/al-khaser">LordNoteworthy/al-khaser</a></td>
|
||||
<td>Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/nsmfoo/antivmdetection">nsmfoo/antivmdetection</a></td>
|
||||
<td>Script to create templates to use with VirtualBox to make vm detection harder</td>
|
||||
|
Loading…
Reference in New Issue
Block a user