Userland API Monitoring and Code Injection Detection Logo

Userland API Monitoring and Code Injection Detection

0
Free
Visit Website

The document explores the interaction of malware with the Windows API, detailing how malicious payloads are implanted into processes and how to detect such behavior by monitoring API communication. It covers concepts like inline hooking, API monitoring, and various code injection techniques such as DLL injection and process hollowing.

FEATURES

ALTERNATIVES

A malware processing and analytics tool that utilizes Pig, Django, and Elasticsearch to analyze and visualize malware data.

YaraHunter scans container images, running Docker containers, and filesystems to find indicators of malware.

A collection of Yara rules for detecting malware evasion techniques

Educational resources for reverse engineering tutorials by lena151.

A strings statistics calculator for YARA rules to aid malware research.

A write-up of the reverse engineering challenge from the 2019 BambooFox CTF competition

Java code implementing the AutoYara algorithm for automatic Yara rule generation from input samples.

Interactive incremental disassembler with data/control flow analysis capabilities.