0xbekoo / Malware-ResurrectionLinks
This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as part of the Malware Resurrection technique.
☆10Updated 11 months ago
Alternatives and similar repositories for Malware-Resurrection
Users that are interested in Malware-Resurrection are comparing it to the libraries listed below
Sorting:
- Multi-component Remote Access Trojan: C++ client (victim), C# server, and Angular frontend.☆41Updated 7 months ago
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆12Updated 2 years ago
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆41Updated 3 months ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆32Updated 3 years ago
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆27Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Malware Libraries focused in help Malware Development☆26Updated 2 years ago
- MALWARE-101==>> is a comprehensive guide to malware development. Covering basics to advanced techniques, we’ll explore malware types, bui…☆24Updated 2 months ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆11Updated last year
- ☆39Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Updated 2 years ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆27Updated 7 months ago
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆14Updated 6 months ago
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆21Updated 5 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆57Updated 7 months ago
- Simple C++ Reverse Shell☆13Updated 3 years ago
- AES-256 Microsoft Cryptography API Example Use.☆34Updated 2 years ago
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆15Updated 11 months ago
- C++ keylogger to save all the keys pressed into a local txt file☆12Updated 2 years ago
- Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM☆62Updated 2 years ago
- Google Chrome Cookies Stealer. Steals Chrome cookies☆47Updated 2 years ago
- Ransomware written in go, encrypt - decrypt.☆30Updated 7 months ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆13Updated 7 months ago
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆29Updated 2 years ago
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆27Updated 11 months ago
- simple user-mode Rootkit☆107Updated 3 years ago
- Hellokitty Ransomware Source Code☆18Updated 2 years ago
- ☆42Updated last year
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆93Updated 9 months ago
- Simple Ransoware to attack Windows 🌟☆23Updated 2 years ago