Tools > Development
Collection of custom tools and frameworks developed for offensive security operations. Each tool is designed with modularity and extensibility in mind.
Evasion & Anti-Analysis Detector
DevelopmentA red-team focused PE analysis tool that detects evasion techniques, anti-analysis patterns, and suspicious characteristics in Windows executables. Detects direct syscall patterns, API hashing, RWX sections, reflective DLL loaders, AMSI bypass patterns, and ETW patching indicators with weighted risk scoring.
Loader Fingerprinting Tool
DevelopmentA static-analysis tradecraft classifier for Windows loaders. Analyzes Windows PE files to identify execution models, injection intent, API resolution methods, payload styles, and evasion posture. Classifies how a binary plans to execute code and what execution philosophy the author uses.
Malware Report Auto-Writer
DevelopmentAn automated malware analysis reporting engine that translates technical findings into professional, human-readable malware reports. Generates deterministic reports in Markdown, HTML, or PDF formats with specialized sections for evasion techniques and execution philosophies.
// All tools are open source and available on GitHub
// Contributions and feedback are welcome
// Use responsibly and ethically