0xbekoo / Malware-ResurrectionLinks
This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as part of the Malware Resurrection technique.
☆10Updated 7 months ago
Alternatives and similar repositories for Malware-Resurrection
Users that are interested in Malware-Resurrection are comparing it to the libraries listed below
Sorting:
- Multi-component Remote Access Trojan: C++ client (victim), C# server, and Angular frontend.☆27Updated 4 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆31Updated 2 years ago
- Malware Libraries focused in help Malware Development☆23Updated 2 years ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆10Updated 8 months ago
- Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM☆60Updated 2 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆71Updated last year
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆18Updated 2 years ago
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆12Updated 2 years ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆51Updated 4 months ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆12Updated last year
- Project build for joel and joshua students from Germany | course: Advanced Tactics in information security☆23Updated 7 months ago
- A Scantime Crytper that applies an obfuscation method onto a malware/false-positive so an antivirus cannot successfully match it with any…☆16Updated 4 years ago
- ☆37Updated last year
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆13Updated 7 months ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
- Ransomware written in go, encrypt - decrypt.☆27Updated 4 months ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42Updated last year
- ☆19Updated 3 weeks ago
- A command and control framework.☆52Updated 8 months ago
- ☆40Updated last year
- PDF Icon File Type Spoofer☆16Updated last year
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆25Updated last year
- 「🧊」Ring 3 Rootkit for Windows 10☆58Updated 8 months ago
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆18Updated 2 years ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆79Updated 6 months ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆28Updated 3 years ago
- A PowerShell malware that disables all the Windows Security features with UAC Bypass and Anti-VM features. (Designed to work both as a po…☆40Updated 3 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆40Updated 4 months ago
- ☆14Updated 9 months ago