When Things Begin Private
http://www.exetools.com/unpackers.htm
http://cypherx.org/fud-crypter-tour/
http://best-fud-crypters.com/index.html
http://www.buycrypter.com
http://www.softcrypter.com/crypter/
https://code.google.com/p/pescrambler/
— CyberGate Server (https://www.hackcommunity.com/Thread-Cybergate-RAT-Tutorial-For-Beginners-best-version-ever)
https://www.
https://github.com/inquisb/shellcodeexec/pentestgeek.com/2012/01/25/using-metasm-to-avoid-antivirus-detection-ghost-writing-asm/
EVASION Framework:
http://tipstrickshack.blogspot.it/2013/10/list-of-differnet-av-evasion-frameworks.html
https://github.com/secretsquirrel/the-backdoor-factory (The BackDoor Factory, massive on directories and on MAC Files)
https://github.com/inquisb/shellcodeexec/
https://github.com/Veil-Framework/Veil-Evasion/blob/master/modules/payloads/native/Hyperion.py (Hyperion creates an executable with an AES encrypted version of your shellcode. )
PASS THE HAS: (from local credentials to domain credentials)
— http://corelabs.coresecurity.com/index.php?module=Wiki&action=view&type=tool&name=Pass-The-Hash_Toolkit
— https://github.com/inquisb/keimpx (this is useful to test across a whole network if username and passwords are valid in other machines, it uses hashes from Pass-The-Hash toolkit)
GUIDE:
http://www.woodmann.com/TiGa/unpacking.html
https://www.hex-rays.com/products/ida/support/idadoc/
http://www.codeproject.com/Articles/4610/Three-Ways-to-Inject-Your-Code-into-Another-Proces
Collaborative Tools
MalControl
Collaborative Research Int Threats (https://crits.github.io/)
MalwareInformationSharingPlatform (https://github.com/MISP/MISP)
Collective Intelligence Framework (http://csirtgadgets.org/projects)
Reading Books:
http://dfir.org/?q=node%2F8
http://909research.com/find-a-windows-infection-quickly-part-2-with-tools/
http://blog.extremehacking.org/