QuantumWizard888 / Reverse-Engineering-crackmes-with-Ghidra
A collection of random crackme solutions created using Ghidra SRE (software Reverse Engineering) tool for purpose of research.
☆20Updated 7 months ago
Related projects: ⓘ
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆16Updated last year
- Some of CrackMes made by me :)☆18Updated 2 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 3 years ago
- ☆30Updated 11 months ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆18Updated last year
- Sources Codes of many MSIL malwares☆20Updated 2 years ago
- Source Code of MSIL Ransom☆13Updated last year
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 2 years ago
- fanny.bmp MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆33Updated 5 months ago
- A very weird RAT☆19Updated 2 years ago
- ☆14Updated 2 years ago
- A windows kernel-mode rootkit with remote control☆11Updated 2 years ago
- Here are some of my malware reversing papers that I will be publishing☆30Updated 2 years ago
- ☆12Updated this week
- Unpacker and Config Extractor for managed Redline Stealer payloads☆36Updated last year
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆17Updated 2 years ago
- ☆29Updated this week
- malware development kit for x86 windows based platforms with a linux compatible build system☆10Updated last year
- Progress of learning kernel development☆13Updated last year
- a small wiper malware programmed in c#☆43Updated last year
- IDA plugin to deobfuscate emotet CFF☆13Updated 2 years ago
- ☆33Updated last year
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Updated 2 years ago
- Process injection via KernelCallbackTable☆14Updated 2 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Updated last year
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆15Updated 4 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆19Updated 10 months ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆8Updated last year
- using the Recycle Bin to insure persistence☆11Updated 2 years ago