You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
Thomas Roccia e91921932f
Merge pull request #3 from Ap3x/main
4 weeks ago
README.md Update README.md 4 weeks ago

README.md

Awesome Malware Techniques Awesome

A curated list of resources to analyse and study malware techniques.

  • Unprotect: Unprotect is an open malware evasion techniques database that provides code snippet and detection rules.
  • LolBas: Living Off The Land Binaries, Scripts and Libraries.
  • ORKL: Search engine for Threat Intelligence reports.
  • HijackLibs: A curated list of DLL Hijacking candidates. A mapping between DLLs and vulnerable executables is kept and can be searched via this website.
  • Living Off Trusted Sites: Attackers are using popular legitimate domains when conducting phishing, C&C, exfiltration and downloading tools to evade detection.
  • MalApi: Collection of API used by malware.
  • FileSec: Collection of file extensions being used by attackers.
  • GTOFBin: GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.
  • Malware Persistence: Collection of malware persistence techniques.
  • Malware Event ID: Collection of EventID triggered by malware.
  • Malware Privilege Escalation: Collection of privilege escalation techniques.
  • Various Malware Techniques: Several malware techniques listed on Vx-Underground.
  • Malware Museum: A database of old malware samples.
  • KernelMode.Info: Interesting low level resources, the forum is no more active since few years.
  • UnknownCheats Anti-Cheat Bypass: UnknownCheats is a cheats developers forum, the Anti-Cheat Bypass section is probably the most interesting part on this forum because the bypasses can be used also for red-teaming or by bad actors.
  • formats_vs_techniques: This table shows the various techniques that can be used in malicious documents to trigger code execution, and the file formats in which they can be embedded.
  • CheckPoint Malware Evasion Techniques: Collection of malware evasion techniques.