LucaBongiorni / jellyfish
GPU rootkit PoC by Team Jellyfish
☆97Updated 9 years ago
Alternatives and similar repositories for jellyfish:
Users that are interested in jellyfish are comparing it to the libraries listed below
- POC viruses I have created to demo some ideas☆59Updated 4 years ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆116Updated 8 years ago
- Simple 32/64-bit PEs loader.☆137Updated 6 years ago
- ☆158Updated 3 years ago
- Abusing exceptions for code execution.☆109Updated 2 years ago
- SentinelOne's KeRnel Exploits Advanced Mitigations☆53Updated 6 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 4 years ago
- A novel technique to hide code from debuggers & disassemblers☆155Updated 7 months ago
- A git history of Windows filesystems☆76Updated 4 years ago
- ☆108Updated 4 years ago
- ☆48Updated 4 years ago
- Yet another windows internals repo☆204Updated 3 years ago
- Set of antianalysis techniques found in malware☆129Updated last year
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆219Updated last year
- The first Linux hooking framework to allow merging two binary files into one!☆94Updated 4 years ago
- Parsers for custom malware formats ("Funky malware formats")☆93Updated 3 years ago
- In line function hooking LKM rootkit☆51Updated 5 years ago
- A PoC designed to bypass all usermode hooks in a WoW64 environment.☆149Updated 4 years ago
- ☆104Updated 5 years ago
- Binary Golf Library☆62Updated 3 years ago
- Sample project for kernel debugging automation with Vagrant☆60Updated 4 years ago
- Exploits I've authored☆60Updated 5 years ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆34Updated 3 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆182Updated 5 years ago
- ☆37Updated 3 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆231Updated 3 years ago
- This is a simple example and explanation of obfuscating API resolution via hashing☆235Updated 4 years ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆195Updated 4 years ago
- Enumerate user mode shared memory mappings on Windows.☆117Updated 4 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆110Updated 4 years ago