PoCInnovation / Whitecomet-ResearchLinks
Research on malware creation and protection
☆64Updated 5 years ago
Alternatives and similar repositories for Whitecomet-Research
Users that are interested in Whitecomet-Research are comparing it to the libraries listed below
Sorting:
- Basic disassembly technique to slow down disasm process☆11Updated 6 years ago
- Workshops organized to introduce students to security, AI, blockchain, AR/VR, hardware and software☆386Updated last month
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆74Updated 4 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated 2 years ago
- Another linux ELF packer to evade hash detection.☆35Updated 4 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 6 years ago
- Simple little rootkit made in C☆13Updated 4 years ago
- Simple website to automatically generate string encryption/decryption routines for C#☆10Updated 4 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆72Updated 7 years ago
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆80Updated 3 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- Antivirus Emulator Fingerprints☆30Updated 7 years ago
- Royal Road RTF Weaponizer object decoder☆24Updated last year
- ☆76Updated 2 years ago
- Set of antianalysis techniques found in malware☆133Updated 2 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆55Updated 7 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆58Updated 6 months ago
- DarkRats Standalone HVNC☆25Updated 3 years ago
- Anti-reverse Compilation☆33Updated 4 years ago
- ☆28Updated 6 years ago
- DarkRat source - beware untested source and resources.☆21Updated 6 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- fanny.bmp cleaned MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆46Updated 7 months ago
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆15Updated 5 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago
- Bypass Malware Time Delays☆108Updated 3 years ago
- what the fuck is this shit☆25Updated 10 years ago
- simple user-mode Rootkit☆108Updated 3 years ago
- Rite Of Passage ROP Injector☆34Updated 6 years ago
- The evolution of NxRansomware☆11Updated 6 years ago