LaineRumreich / PolymorphicVirus
Polymorphic virus and anitvirus software for information security team project.
☆19Updated 5 years ago
Related projects: ⓘ
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆63Updated 6 years ago
- Russian Wipers Dropper (educational-purposes )☆84Updated 2 years ago
- A simple polymorphic virus that changes its signature whenever it replicates☆11Updated 7 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆114Updated 3 years ago
- Basic packer using XOR encryption☆28Updated 5 months ago
- Just another collection of links, tools, reports and other stuff☆19Updated 3 years ago
- Resources and articles I need to take a look at. Mostly about malware/exploit development and analysis.☆80Updated 2 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆65Updated 2 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆65Updated 3 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Updated last year
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆42Updated 2 years ago
- user-mode Rootkit☆98Updated last year
- XssBot-Модульный резидентный бот с супер админкой☆12Updated last year
- ☆124Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆45Updated 5 months ago
- Evasive Process Hollowing Techniques☆132Updated 4 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆26Updated 4 years ago
- Red Team Operator: Malware Development Essentials Course☆92Updated 4 years ago
- Embed an executable as a PE resource, drops and launches it in runtime.☆54Updated 3 years ago
- A simple implant showcasing modern C++☆101Updated 3 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 2 years ago
- How to spoof the command line when spawning a new process from C#.☆100Updated 2 years ago
- Winsock accept() Backdoor Implant.☆110Updated 3 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆213Updated last year
- This repo basically contains the code that was mentioned in the blogposts that was written by me at:☆89Updated last year
- ☆87Updated 3 years ago
- ☆65Updated 3 years ago
- Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+☆42Updated 2 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆72Updated 2 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆23Updated 4 years ago