PoCInnovation / Whitecomet-ResearchLinks
Research on malware creation and protection
☆63Updated 4 years ago
Alternatives and similar repositories for Whitecomet-Research
Users that are interested in Whitecomet-Research are comparing it to the libraries listed below
Sorting:
- Basic disassembly technique to slow down disasm process☆11Updated 5 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆72Updated 4 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated 2 years ago
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆14Updated 5 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 5 years ago
- Process Hollowing demonstration & explanation☆35Updated 4 years ago
- An example of PE hollowing injection technique☆24Updated 6 years ago
- The evolution of NxRansomware☆11Updated 6 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago
- DarkRat source - beware untested source and resources.☆22Updated 5 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆52Updated this week
- Bypass Malware Time Delays☆102Updated 2 years ago
- Antivirus Emulator Fingerprints☆29Updated 6 years ago
- Rite Of Passage ROP Injector☆34Updated 6 years ago
- ☆10Updated 3 years ago
- Another linux ELF packer to evade hash detection.☆35Updated 3 years ago
- Various shell code I have written☆17Updated 4 years ago
- My collection of unpackers for malware packers/crypters☆28Updated 7 years ago
- DarkRats Standalone HVNC☆24Updated 3 years ago
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆97Updated 5 years ago
- ☆28Updated 6 years ago
- A simple tool for detecting memory modifications to Windows API.☆22Updated 7 months ago
- A Simple AES Command Line Crypter☆36Updated 2 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆14Updated 5 years ago
- Simple Packer PE File☆15Updated 6 years ago
- Proof of concept memory anti-forensic toolkit designed for hiding various artifacts inside the memory dump during memory acquisition on M…☆12Updated 5 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆14Updated 5 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆91Updated 6 years ago
- An Xdbg Plugin of the ERC Library.☆26Updated last year
- Bare template for a Kernel Mode Driver☆51Updated 5 years ago