PoCInnovation / Whitecomet-ResearchLinks
Research on malware creation and protection
☆64Updated 4 years ago
Alternatives and similar repositories for Whitecomet-Research
Users that are interested in Whitecomet-Research are comparing it to the libraries listed below
Sorting:
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated 2 years ago
- Simple website to automatically generate string encryption/decryption routines for C#☆10Updated 3 years ago
- Another linux ELF packer to evade hash detection.☆35Updated 4 years ago
- Basic disassembly technique to slow down disasm process☆11Updated 6 years ago
- Set of antianalysis techniques found in malware☆131Updated 2 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆74Updated 4 years ago
- Simple API Hooks detector☆75Updated 3 years ago
- A simple polymorphic engine☆44Updated 6 years ago
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆80Updated 2 years ago
- Some of CrackMes made by me :)☆18Updated 3 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 5 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- Program to leak anti-virus behaviour and such☆14Updated 6 years ago
- ☆74Updated last year
- DarkRat source - beware untested source and resources.☆22Updated 5 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆56Updated 3 months ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 6 years ago
- Antivirus Emulator Fingerprints☆29Updated 7 years ago
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆20Updated last year
- DarkRats Standalone HVNC☆24Updated 3 years ago
- Read my blog for more info -☆32Updated 4 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 6 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆11Updated 4 years ago
- PoC for hiding PE exports☆67Updated 4 years ago
- A small library helping to parse commandline parameters (for C/C++)☆58Updated 5 months ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago
- ☣️ Necro Stealer + Web Panel☆10Updated 5 years ago
- Polymorphic ELF Runtime Crypter written in rust.☆21Updated 4 years ago
- 💻 Windows 10 Kernel-mode rootkit☆32Updated 3 years ago
- Rite Of Passage ROP Injector☆34Updated 6 years ago