86hh / POC-viruses
POC viruses I have created to demo some ideas
☆59Updated 5 years ago
Alternatives and similar repositories for POC-viruses
Users that are interested in POC-viruses are comparing it to the libraries listed below
Sorting:
- Tools for instrumenting Windows Defender's mpengine.dll☆37Updated 6 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- Parsers for custom malware formats ("Funky malware formats")☆96Updated 3 years ago
- Flare-On solutions☆36Updated 5 years ago
- ☆48Updated 4 years ago
- ☆49Updated 7 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- Control Flow Guard Teleportation demo☆23Updated 5 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆43Updated last year
- ☆51Updated 8 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆116Updated 6 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- ☆85Updated last year
- SentinelOne's KeRnel Exploits Advanced Mitigations☆53Updated 6 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Another Repo of Malware. Enjoy. <3☆59Updated 6 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆90Updated 5 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆123Updated 4 years ago
- ☆45Updated 6 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆42Updated 5 years ago
- A tool to exploit .NET DCOM for EoP and RCE. Is fixed in latest versions of the .NET.☆91Updated 10 years ago
- ☆49Updated 5 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass☆62Updated 7 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆38Updated 9 years ago
- DLL Injection Library & Tools☆72Updated 8 years ago
- An Integrity-Check Monitoring Pintool☆57Updated 4 years ago