Userland API Monitoring and Code Injection Detection Logo

Userland API Monitoring and Code Injection Detection

0
Free
Visit Website

The document explores the interaction of malware with the Windows API, detailing how malicious payloads are implanted into processes and how to detect such behavior by monitoring API communication. It covers concepts like inline hooking, API monitoring, and various code injection techniques such as DLL injection and process hollowing.

FEATURES

ALTERNATIVES

A tool for injecting and loading executables with a focus on stealth techniques.

A program to extract IOCs from text files using regular expressions

Studying Android malware behaviors through Information Flow monitoring techniques.

A tool that reveals invisible links within JavaScript files

A Python script for scanning data within an IDB using Yara

FLARE Obfuscated String Solver (FLOSS) automatically extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.

A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence

Parse YARA rules into a dictionary representation.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved