Userland API Monitoring and Code Injection Detection Logo

Userland API Monitoring and Code Injection Detection

0
Free
Updated 11 March 2025
Visit Website

The document explores the interaction of malware with the Windows API, detailing how malicious payloads are implanted into processes and how to detect such behavior by monitoring API communication. It covers concepts like inline hooking, API monitoring, and various code injection techniques such as DLL injection and process hollowing.

FEATURES

SIMILAR TOOLS

A Burp extension to check JWT tokens for potential weaknesses

OCaml wrapper for YARA matching engine for malware identification

KLara is a distributed system written in Python that helps Threat Intelligence researchers hunt for new malware using Yara.

Yaraprocessor allows for scanning data streams in unique ways and dynamic scanning of payloads from network packet captures.

A Windows context menu integration tool that scans files and folders for malware patterns, crypto signatures, and malicious documents using Yara rules and PEID signatures.

A static analysis tool for PE files that detects malicious behavior and provides information for manual analysis.

VxSig is a tool to automatically generate AV byte signatures from similar binaries.

A script to detect and remove Canary Tokens with simple signature-based detections.

A powerful tool for detecting and identifying malware using a rule-based system.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved