0xbekoo / Malware-ResurrectionLinks
This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as part of the Malware Resurrection technique.
☆10Updated 9 months ago
Alternatives and similar repositories for Malware-Resurrection
Users that are interested in Malware-Resurrection are comparing it to the libraries listed below
Sorting:
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- MALWARE-101==>> is a comprehensive guide to malware development. Covering basics to advanced techniques, we’ll explore malware types, bui…☆21Updated this week
- Multi-component Remote Access Trojan: C++ client (victim), C# server, and Angular frontend.☆35Updated 5 months ago
- Malware Libraries focused in help Malware Development☆27Updated 2 years ago
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆25Updated last year
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆12Updated last year
- This is a simple process injection made in C for Linux systems☆29Updated 2 years ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆32Updated 2 years ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
- Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM☆63Updated 2 years ago
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆14Updated 2 years ago
- Hellokitty Ransomware Source Code☆16Updated 2 years ago
- Ransomware written in go, encrypt - decrypt.☆29Updated 5 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆73Updated last year
- AES-256 Microsoft Cryptography API Example Use.☆33Updated last year
- Google Chrome Cookies Stealer. Steals Chrome cookies☆45Updated last year
- Project build for joel and joshua students from Germany | course: Advanced Tactics in information security☆24Updated 8 months ago
- Perform Thread Hijacking Shellcode Injection without OpenProcess and OpenThread mapping all the free handles in memory☆15Updated last year
- A PowerShell malware that disables all the Windows Security features with UAC Bypass and Anti-VM features. (Designed to work both as a po…☆41Updated 4 months ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆13Updated last year
- ☆41Updated last year
- 「🧊」Ring 3 Rootkit for Windows 10☆57Updated 10 months ago
- ShoDam is a simple and effective bookmarklet designed to extract IP addresses from Shodan search results with a single click.☆17Updated 11 months ago
- ☆38Updated last year
- PDF Icon File Type Spoofer☆18Updated last year
- A command and control framework.☆55Updated 9 months ago
- the assembly shell and backdoor Trojan☆19Updated 3 years ago
- Inject shellcode into a valid BMP/GIF image.☆32Updated 5 years ago
- Simple C++ Reverse Shell☆13Updated 2 years ago