LaineRumreich / PolymorphicVirusLinks
Polymorphic virus and anitvirus software for information security team project.
☆21Updated 6 years ago
Alternatives and similar repositories for PolymorphicVirus
Users that are interested in PolymorphicVirus are comparing it to the libraries listed below
Sorting:
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆192Updated 3 months ago
- A simple polymorphic virus that changes its signature whenever it replicates☆12Updated 8 years ago
- This repo basically contains the code that was mentioned in the blogposts that was written by me at:☆97Updated 2 years ago
- This repo will contain code snippets for blogs: Malware on Steroids written by me at https://scriptdotsh.com/index.php/category/malware-d…☆199Updated 5 years ago
- Conti Locker source code☆196Updated 3 years ago
- Research on Anti-malware and other related security solutions☆262Updated 5 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆129Updated 4 years ago
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆232Updated 10 months ago
- ☆133Updated 2 years ago
- Packer (actually a crypter) for antivirus evasion implemented for windows PE files (BSc-Thesis)☆106Updated 5 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago
- ☆69Updated 4 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 6 years ago
- Cryline project - It's a simple test ransomware for Windows OS without stable encryption. Pls use this source code for study purposes on…☆58Updated 5 months ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆458Updated 4 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆96Updated 4 years ago
- Kernel Exploits☆260Updated 4 years ago
- Multi-threaded, multi-os/platform (Linux/Windows) c2 server and Windows reverse TCP shell client both written in C.☆121Updated 3 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆228Updated 2 years ago
- ☆137Updated 8 months ago
- Embed an executable as a PE resource, drops and launches it in runtime.☆64Updated 4 years ago
- Source code of exploiting windows API for red teaming series☆150Updated 3 years ago
- Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used …☆151Updated 2 years ago
- Evasive Process Hollowing Techniques☆141Updated 5 years ago
- A simple implant showcasing modern C++☆108Updated 4 years ago
- Winsock accept() Backdoor Implant.☆118Updated 4 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆90Updated 8 years ago
- Library For Creating Local & Remote Procedure Calls Between Different Running Processes☆81Updated last year
- My notes while studying Windows exploitation☆190Updated 2 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆75Updated 3 years ago