LaineRumreich / PolymorphicVirusLinks
Polymorphic virus and anitvirus software for information security team project.
☆20Updated 6 years ago
Alternatives and similar repositories for PolymorphicVirus
Users that are interested in PolymorphicVirus are comparing it to the libraries listed below
Sorting:
- Compile shellcode into an exe file from Windows or Linux.☆66Updated this week
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆27Updated 5 years ago
- A simple polymorphic virus that changes its signature whenever it replicates☆12Updated 7 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆45Updated 5 years ago
- Red Team Operator: Malware Development Essentials Course☆98Updated 4 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Updated 2 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆70Updated 3 years ago
- XssBot-Модульный резидентный бот с супер админкой☆11Updated 2 years ago
- PoC of a UEFI Petya ransomware☆43Updated 2 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆64Updated 7 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆36Updated last year
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- ☆73Updated last year
- ☆67Updated 3 years ago
- Evasive Process Hollowing Techniques☆139Updated 4 years ago
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆31Updated 3 years ago
- Embed an executable as a PE resource, drops and launches it in runtime.☆60Updated 3 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 2 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated last year
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆71Updated 4 years ago
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆108Updated 4 years ago
- PoC MSVC COFF Object file loader/injector.☆177Updated 4 years ago
- Red Team Operation's Defense Evasion Technique.☆52Updated last year
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Updated 2 years ago
- Resources and articles I need to take a look at. Mostly about malware/exploit development and analysis.☆82Updated 3 years ago
- Bypass Malware Time Delays☆101Updated 2 years ago
- Piece of code to detect and remove hooks in IAT☆63Updated 3 years ago
- ☆85Updated 2 years ago
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆37Updated 3 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆75Updated 3 years ago