BreakingMalwareResearch / atom-bombingLinks
Brand New Code Injection for Windows
☆741Updated 5 years ago
Alternatives and similar repositories for atom-bombing
Users that are interested in atom-bombing are comparing it to the libraries listed below
Sorting:
- Demos of various injection techniques found in malware☆795Updated 3 years ago
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆998Updated 6 years ago
- Zero-Day Code Injection and Persistence Technique☆1,247Updated 3 years ago
- ☆519Updated 7 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆382Updated 8 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆505Updated 8 years ago
- peinjector - MITM PE file infector☆608Updated 9 years ago
- dll injection tool that implements various methods☆500Updated 13 years ago
- A set of tutorials about code injection for Windows.☆314Updated last year
- Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools☆463Updated 7 years ago
- windows syscall table from xp ~ 10 rs4☆356Updated 7 years ago
- metame is a metamorphic code engine for arbitrary executables☆599Updated 6 years ago
- Mirror of users section of rootkit.com☆303Updated 9 years ago
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆743Updated 6 years ago
- Shellcode Compiler☆1,147Updated last year
- A proof of concept injectable C++ dll, that uses naked inline hooking and direct memory modification to change your TeamViewer permissio…☆309Updated 8 years ago
- ☆408Updated 8 years ago
- Driver loader for bypassing Windows x64 Driver Signature Enforcement☆1,183Updated 6 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆808Updated last year
- InfectPE - Inject custom code into PE file [This project is not maintained anymore]☆327Updated 8 years ago
- First open source and publicly available System Management Mode backdoor for UEFI based platforms. Good as general purpose playground for…☆628Updated 2 years ago
- proof-of-concept implementation of tor protocol using Microsoft CNG/CryptoAPI☆407Updated 6 years ago
- A memory scanning evasion technique☆897Updated 8 years ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆414Updated 6 years ago
- Portable Executable parsing library (from PE-bear)☆659Updated 3 months ago
- WinDBG Anti-RootKit Extension☆643Updated 5 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆971Updated 5 years ago
- Post-exploitation tool for hiding processes from monitoring applications☆746Updated 2 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆438Updated 7 years ago
- Basically a script thrift shop☆590Updated 3 years ago