PoCInnovation / Whitecomet-ResearchLinks
Research on malware creation and protection
☆63Updated 4 years ago
Alternatives and similar repositories for Whitecomet-Research
Users that are interested in Whitecomet-Research are comparing it to the libraries listed below
Sorting:
- A simple polymorphic engine☆42Updated 6 years ago
- Basic disassembly technique to slow down disasm process☆11Updated 6 years ago
- Simple website to automatically generate string encryption/decryption routines for C#☆10Updated 3 years ago
- Simple little rootkit made in C☆13Updated 4 years ago
- Simple tool to check visual studio project files for Exec, PreBuildEvent and PostBuildEvent☆12Updated 5 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆11Updated 2 years ago
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆79Updated 2 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆56Updated 2 months ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆74Updated 4 years ago
- Antivirus Emulator Fingerprints☆29Updated 6 years ago
- Capture newly created files on Windows☆66Updated 3 years ago
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆19Updated last year
- ☆29Updated 2 years ago
- what the fuck is this shit☆25Updated 9 years ago
- Some of CrackMes made by me :)☆18Updated 3 years ago
- ☆19Updated 5 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆27Updated 3 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- Simple API Hooks detector☆74Updated 3 years ago
- Process Hollowing demonstration & explanation☆34Updated 4 years ago
- Another linux ELF packer to evade hash detection.☆35Updated 3 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆31Updated 5 years ago
- DarkRat source - beware untested source and resources.☆22Updated 5 years ago
- NT AUTHORITY\SYSTEM☆40Updated 5 years ago
- Proof of concept memory anti-forensic toolkit designed for hiding various artifacts inside the memory dump during memory acquisition on M…☆12Updated 6 years ago
- TrashDBG the world's worse debugger☆23Updated 3 years ago
- ☆12Updated 5 years ago
- DarkRats Standalone HVNC☆24Updated 3 years ago
- A Simple AES Command Line Crypter☆36Updated 2 years ago