x64dbg 中文版安装程序(Jan 6 2024).exe |
|
52pojie |
|
hellshell |
官方的加密或混淆shellcode |
github |
https://gitlab.com/ORCA000/hellshell/-/releases |
hellshell-网络版本 |
|
github |
https://github.com/SenSecurity/Hellshell-with-more-fuctionality |
Dependencies.AheadLib.Plugin |
在dependencies上额外加了导出函数 |
看雪 |
https://bbs.kanxue.com/thread-260874.htm |
Dependencies |
|
github |
https://github.com/lucasg/Dependencies |
ChangeTimestamp.exe |
更改时间戳 |
|
|
sgn_windows_amd64_2.0.1 |
对二进制文件编码免杀shellcode |
github |
https://github.com/EgeBalci/sgn |
Resource Hacker |
|
|
|
BeaconEye_x64 |
通过扫描CobaltStrike中的内存特征,并进行Beacon Config扫描解析出对应的Beacon信息 |
github |
https://github.com/CCob/BeaconEye/releases |
Hunt-Sleeping-Beacons |
|
github |
https://github.com/thefLink/Hunt-Sleeping-Beacons |
yara-master-2298-win64 |
分类恶意软件样本的工具 |
github |
https://github.com/VirusTotal/yara |
Windows_Trojan_CobaltStrike.yar |
Elastic安全公司开源检测CobaltStrike的yara规则 |
github |
https://github.com/elastic/protections-artifacts/blob/main/yara/rules/Windows_Trojan_CobaltStrike.yar |
hollows_hunter64 |
|
github |
https://github.com/hasherezade/hollows_hunter |
arsenal_kit |
|
telegram |
|
DLLSpy |
检测正在运行的进程、服务及其二进制文件中的 DLL 劫持 |
github |
|
Process Hacker 2 |
查看进程 |
|
|
Alcatraz |
没下载, x64 二进制混淆器,能够混淆各种不同的 pe 文件 |
github |
https://github.com/weak1337/Alcatraz |
pestudio-9.58 |
查看文件熵值等信息,逆向等可用 |
官网下载 |
https://www.winitor.com/download2 |
https://junkcode.gehaxelt.in/ |
垃圾代码生成器,降低熵值 |
github |
https://github.com/gehaxelt/PHP-C---JunkCodeGenerator |
sgn_windows_amd64_2.0.1 |
编码shellcode |
github |
|
ChangeTimestamp.exe |
改时间 |
|
|
SigThief |
把签名撕取下来 |
github |
https://github.com/secretsquirrel/SigThief |
Restorator2018 |
伪造图标 |
https://www.sqlsec.com/tools.html |
https://www.sqlsec.com/tools.html |
BeCyIconGrabber.exe |
伪造图标 |
https://www.sqlsec.com/tools.html |
https://www.sqlsec.com/tools.html |
SourcePoint |
自生成Malleable C2 profile |
github |
https://github.com/Tylous/SourcePoint |
S-inject |
DLL+Shellcode的Windows注入免杀工具 |
github |
https://github.com/Joe1sn/S-inject |
RingQ |
免杀,exe2shellcode |
github |
https://github.com/T4y1oR/RingQ |
pe2shc.exe |
pe_to_shellcode |
github |
https://github.com/hasherezade/pe_to_shellcode/ |