Chiggins / malware_sources
☆223Updated 8 years ago
Alternatives and similar repositories for malware_sources:
Users that are interested in malware_sources are comparing it to the libraries listed below
- A tool to detect and crash Cuckoo Sandbox☆293Updated 8 months ago
- Carberp Banking Trojan☆113Updated 10 years ago
- ZeroAccess v3 toolkit☆164Updated 7 years ago
- Various snippets created during malware analysis☆459Updated 2 years ago
- C++ application that uses memory and code hooks to detect packers☆270Updated 7 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆491Updated 7 years ago
- Tinba Banking Trojan☆84Updated 10 years ago
- ☆516Updated 7 years ago
- Mirror of users section of rootkit.com☆294Updated 8 years ago
- Cminer is a tool for enumerating the code caves in PE files.☆149Updated 2 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆321Updated 2 years ago
- A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.☆405Updated 10 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆214Updated 4 years ago
- malware source codes☆550Updated 2 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆365Updated 8 years ago
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆281Updated 7 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆314Updated 7 years ago
- Exploitkit☆184Updated 8 years ago
- TDL4 style rootkit to spoof read/write requests to master boot record☆130Updated 7 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆88Updated 9 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆182Updated 6 years ago
- Malware exploits☆543Updated 5 years ago
- This is a **WIP** tool that performs shellcode obfuscation in x86 instruction set.☆238Updated 8 years ago
- Personal research and publication on malware families☆137Updated 3 months ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆263Updated 7 years ago
- HORSEPILL rootkit PoC☆226Updated 8 years ago
- Demos of various injection techniques found in malware☆791Updated 3 years ago
- A repository of tools and scripts related to malware analysis☆247Updated 8 years ago
- Simple runtime crypter in C/C++.☆162Updated 9 years ago
- Malware Analyst's Cookbook stuffs☆154Updated 9 years ago