Kaiser File-less Persistence is a discontinued project with capabilities for attacks and anti-forensic activities on Windows 7 32-bit systems. To build and use, compile Kaiser.dll in Release mode, upload it for direct download, update BuildKaiser.ps1 with the URL, run the script to build Payload.ps1, upload Payload.ps1 for direct download, update BuildKaiser.ps1 with the URL of Payload.ps1, run BuildKaiser.ps1 to build Installer.ps1, and execute Installer.ps1 with administrative privileges on the target machine. Known bugs include threaded XxxNetSend sends buffering and PurgeXxx functions not guaranteed to work.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A collaborative malware analysis framework with various features for automated analysis tasks.
Code to prevent a managed .NET debugger/profiler from working.
A static analysis tool for PE files that detects malicious behavior and provides information for manual analysis.
A tool designed to handle archive file data and augment Yara's capabilities.
A sandbox for quickly sandboxing known or unknown families of Android Malware
A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
Valkyrie is a sophisticated file verdict system that enhances malware detection through behavioral analysis and extensive file feature examination.
Blazingly fast Yara queries for malware analysts with an analyst-friendly web GUI.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.