PoCInnovation / Whitecomet-ResearchLinks
Research on malware creation and protection
☆63Updated 4 years ago
Alternatives and similar repositories for Whitecomet-Research
Users that are interested in Whitecomet-Research are comparing it to the libraries listed below
Sorting:
- Another linux ELF packer to evade hash detection.☆35Updated 4 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆74Updated 4 years ago
- Proof of concept memory anti-forensic toolkit designed for hiding various artifacts inside the memory dump during memory acquisition on M…☆12Updated 6 years ago
- Basic disassembly technique to slow down disasm process☆11Updated 6 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆56Updated 2 months ago
- A small library helping to parse commandline parameters (for C/C++)☆58Updated 5 months ago
- Simple website to automatically generate string encryption/decryption routines for C#☆10Updated 3 years ago
- Simple PE Packer Which Encrypts .text Section☆50Updated 8 years ago
- Rite Of Passage ROP Injector☆34Updated 6 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆27Updated 3 years ago
- ☆10Updated 3 years ago
- a collection of elf file infectors☆27Updated 4 years ago
- what the fuck is this shit☆25Updated 9 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago
- The evolution of NxRansomware☆11Updated 6 years ago
- Dodgy reflective DLL injector PoC for 32-bit Windows☆16Updated 7 years ago
- C Header Only Library for Virii☆12Updated 4 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆19Updated 8 months ago
- Process Hollowing☆12Updated 8 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆36Updated 2 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated 2 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆32Updated 6 years ago
- NT AUTHORITY\SYSTEM☆42Updated 5 years ago
- ☆74Updated last year
- Alleged source code leak of Osiris banking trojan☆36Updated 4 years ago
- PoC for hiding PE exports☆67Updated 4 years ago
- DarkRat source - beware untested source and resources.☆22Updated 5 years ago
- Process Hollowing demonstration & explanation☆34Updated 4 years ago
- Simple API Hooks detector☆75Updated 3 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆37Updated 10 years ago