K2 / ADMMutate
Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia.edu/sites/default/files/ccs07poly.pdf :) If I ever port this to 64 or implement a few other suggestions (sorry I lost ppc code version contributed) it will be orders of magnitude more difficult to spot, so I…
☆87Updated last year
Alternatives and similar repositories for ADMMutate:
Users that are interested in ADMMutate are comparing it to the libraries listed below
- A gadget finder and a ROP-Chainer tool for x86 platforms☆93Updated 3 years ago
- Python script to inject and run shellcodes through TLS callbacks☆50Updated 9 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 7 years ago
- ☆113Updated 8 years ago
- Set of my small utils related to cryptography, encoding, decoding etc☆85Updated 11 months ago
- A Python tool to generate ROP chains☆60Updated 3 weeks ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- kernel exploitation helper class☆76Updated 8 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆96Updated 12 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆97Updated 8 years ago
- Exploiting MS15-061 local Privilege escalation☆50Updated 9 years ago
- Blackhat 2012 Sample Codes☆93Updated 8 years ago
- POC viruses I have created to demo some ideas☆59Updated 4 years ago
- Full DLL Hooking, phrack 65☆46Updated last year
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 6 years ago
- Bootkits Revisited☆41Updated 10 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- Windows NT ioctl bruteforcer and modular fuzzer☆121Updated 6 years ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆116Updated 8 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 5 years ago
- ViDi Visual Disassembler (experimental)☆76Updated 2 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆50Updated 6 years ago
- Passive UAC elevation using dll infection☆73Updated 10 years ago
- Reflective Polymorphism☆104Updated 6 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- ☆43Updated 7 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆93Updated 3 years ago
- Automatically exported from code.google.com/p/malware-lu☆55Updated 5 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆213Updated 4 years ago