Tools > Development

Collection of custom tools and frameworks developed for offensive security operations. Each tool is designed with modularity and extensibility in mind.

Evasion & Anti-Analysis Detector

Development

A red-team focused PE analysis tool that detects evasion techniques, anti-analysis patterns, and suspicious characteristics in Windows executables. Detects direct syscall patterns, API hashing, RWX sections, reflective DLL loaders, AMSI bypass patterns, and ETW patching indicators with weighted risk scoring.

PE AnalysisEvasion DetectionAnti-AnalysisRisk ScoringPython
Python

Loader Fingerprinting Tool

Development

A static-analysis tradecraft classifier for Windows loaders. Analyzes Windows PE files to identify execution models, injection intent, API resolution methods, payload styles, and evasion posture. Classifies how a binary plans to execute code and what execution philosophy the author uses.

Static AnalysisPE AnalysisLoader ClassificationTradecraftPython
Python

Malware Report Auto-Writer

Development

An automated malware analysis reporting engine that translates technical findings into professional, human-readable malware reports. Generates deterministic reports in Markdown, HTML, or PDF formats with specialized sections for evasion techniques and execution philosophies.

Malware AnalysisReportingAutomationCLIPython
PythonJinja

// All tools are open source and available on GitHub

// Contributions and feedback are welcome

// Use responsibly and ethically