Userland API Monitoring and Code Injection Detection Logo

Userland API Monitoring and Code Injection Detection

0
Free
Visit Website

The document explores the interaction of malware with the Windows API, detailing how malicious payloads are implanted into processes and how to detect such behavior by monitoring API communication. It covers concepts like inline hooking, API monitoring, and various code injection techniques such as DLL injection and process hollowing.

FEATURES

ALTERNATIVES

Python wrapper for the Libemu library for analyzing shellcode.

A debugger tool for reverse engineers, crackers, and security analysts, with a user-friendly debugging UI and custom agent support.

Define and validate YARA rule metadata with CCCS YARA Specification.

Scans running processes for potentially malicious implants and dumps them.

A collection of Android Applications with malware analysis results

A collection of Yara signatures for identifying malware and other threats

Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32

A tool for signature analysis of RTF files to detect potentially unique parts and malicious documents.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved