K2 / ADMMutate
Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia.edu/sites/default/files/ccs07poly.pdf :) If I ever port this to 64 or implement a few other suggestions (sorry I lost ppc code version contributed) it will be orders of magnitude more difficult to spot, so I…
☆87Updated last year
Alternatives and similar repositories for ADMMutate:
Users that are interested in ADMMutate are comparing it to the libraries listed below
- kernel exploitation helper class☆76Updated 8 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆97Updated 8 years ago
- POC viruses I have created to demo some ideas☆59Updated 4 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆93Updated 3 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 6 years ago
- A Python tool to generate ROP chains☆60Updated last month
- Exploiting MS15-061 local Privilege escalation☆50Updated 9 years ago
- Python script to inject and run shellcodes through TLS callbacks☆50Updated 9 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- Security Research and Development Framework☆106Updated 9 years ago
- Cminer is a tool for enumerating the code caves in PE files.☆148Updated last year
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆116Updated 6 years ago
- C++-based shellcode builder☆112Updated 4 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆96Updated 12 years ago
- Automatically exported from code.google.com/p/malware-lu☆55Updated 5 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- ☆113Updated 8 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- simple shellcode generator☆112Updated 8 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆214Updated 7 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆81Updated 8 years ago
- Bootkits Revisited☆41Updated 10 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆31Updated 9 years ago
- Flare-On solutions☆36Updated 5 years ago
- Fork of mona.py with x64dbg support☆102Updated 2 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 6 years ago
- A CrackMe powered with a virtual machine.☆44Updated 9 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆182Updated 5 years ago
- A tiny hacking framework for the PwnAdventure3: Pwnie Island game created by http://ghostintheshellcode.com/ ( http://pwnadventure.com/ )☆26Updated 10 years ago