The document explores the interaction of malware with the Windows API, detailing how malicious payloads are implanted into processes and how to detect such behavior by monitoring API communication. It covers concepts like inline hooking, API monitoring, and various code injection techniques such as DLL injection and process hollowing.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
KLara is a distributed system written in Python that helps Threat Intelligence researchers hunt for new malware using Yara.
Yaraprocessor allows for scanning data streams in unique ways and dynamic scanning of payloads from network packet captures.
A Windows context menu integration tool that scans files and folders for malware patterns, crypto signatures, and malicious documents using Yara rules and PEID signatures.
A static analysis tool for PE files that detects malicious behavior and provides information for manual analysis.
VxSig is a tool to automatically generate AV byte signatures from similar binaries.
A script to detect and remove Canary Tokens with simple signature-based detections.
A powerful tool for detecting and identifying malware using a rule-based system.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.