BreakingMalwareResearch / atom-bombing
Brand New Code Injection for Windows
☆729Updated 4 years ago
Alternatives and similar repositories for atom-bombing:
Users that are interested in atom-bombing are comparing it to the libraries listed below
- Demos of various injection techniques found in malware☆791Updated 3 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆366Updated 8 years ago
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆998Updated 6 years ago
- ☆516Updated 7 years ago
- Zero-Day Code Injection and Persistence Technique☆1,228Updated 2 years ago
- A set of tutorials about code injection for Windows.☆311Updated 7 months ago
- Kernel rootkit, that lives inside the Windows registry values data☆493Updated 7 years ago
- dll injection tool that implements various methods☆489Updated 12 years ago
- peinjector - MITM PE file infector☆604Updated 8 years ago
- metame is a metamorphic code engine for arbitrary executables☆580Updated 5 years ago
- A tool to help you write binary exploits☆610Updated 6 years ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆394Updated 5 years ago
- A memory scanning evasion technique☆863Updated 7 years ago
- Shellcode Compiler☆1,095Updated 7 months ago
- A proof of concept injectable C++ dll, that uses naked inline hooking and direct memory modification to change your TeamViewer permissio…☆309Updated 7 years ago
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆739Updated 6 years ago
- zer0m0n driver for cuckoo sandbox☆359Updated 9 years ago
- windows syscall table from xp ~ 10 rs4☆353Updated 6 years ago
- Portable Executable parsing library (from PE-bear)☆658Updated last week
- InfectPE - Inject custom code into PE file [This project is not maintained anymore]☆323Updated 7 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆784Updated last year
- proof-of-concept implementation of tor protocol using Microsoft CNG/CryptoAPI☆400Updated 6 years ago
- WinDBG Anti-RootKit Extension☆628Updated 4 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,368Updated 2 years ago
- Various snippets created during malware analysis☆459Updated 2 years ago
- Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools☆451Updated 6 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆957Updated 4 years ago
- A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.☆405Updated 10 years ago
- C++ application that uses memory and code hooks to detect packers☆270Updated 7 years ago
- Arbitrary code execution with kernel privileges using CVE-2018-8897.☆413Updated 6 years ago