PandiPanda69 / Virus.Lolita69Links
Project that aims to let student teams write their own virus which must not be detected by team self-developped antivirus.
☆14Updated 12 years ago
Alternatives and similar repositories for Virus.Lolita69
Users that are interested in Virus.Lolita69 are comparing it to the libraries listed below
Sorting:
- Code Injector Using Code Caves☆15Updated 10 years ago
- reverse engineering, visual binary analysis☆24Updated 8 years ago
- A simple rootkit to hide a process☆46Updated 11 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Updated 10 years ago
- Sample libraries to be used with IAT Patcher☆34Updated 2 years ago
- ☆23Updated 9 years ago
- Bootkits Revisited☆40Updated 11 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 7 years ago
- Experimental: Windows .text section compare - disk versus memory☆14Updated 10 years ago
- Various Crypter Project☆52Updated 11 years ago
- Alina POS Source Code + Rootkit☆23Updated 9 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 9 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 6 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- A Unix rootkit☆17Updated 4 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 7 years ago
- Ring3 Rootkit Backdoor.☆42Updated 10 years ago
- Simple PE packer with RtlCompressBuffer☆21Updated 9 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Updated 9 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- Educational repository for learning about rootkits and Windows Kernel Hooks.☆49Updated 10 years ago
- PoC for detecting and dumping process hollowing code injection☆51Updated 6 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆28Updated 11 years ago
- Gozi-MBR-rootkit Bootkit Modified☆70Updated 8 years ago
- Debugger checks in 3 ways☆19Updated 7 years ago
- Anti-AV compilation☆44Updated 11 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Updated 8 years ago
- Call undocumented native functions in the windows kernel☆5Updated 3 years ago
- Code injection via delay load libraries☆35Updated 7 years ago
- Experimental Windows .text section Patch Detector☆21Updated 10 years ago