Second Part To Hell's artworks: artificial (life/evolution/intelligence)
☆185Jan 21, 2024Updated 2 years ago
Alternatives and similar repositories for SPTH
Users that are interested in SPTH are comparing it to the libraries listed below
Sorting:
- ☆19Aug 22, 2023Updated 2 years ago
- some AV / EDR / analysis studies☆10May 21, 2023Updated 2 years ago
- Collection of ezine about virii☆17Sep 13, 2022Updated 3 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Oct 28, 2019Updated 6 years ago
- Detours implementation (x64/x86) which used only ntdll import☆93Oct 14, 2025Updated 4 months ago
- A Python client for the Global CVE Allocation System.☆17Jan 31, 2026Updated last month
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- Massayo is a small proof-of-concept Rust library which removes AV/EDR hooks in a given system DLL☆64Sep 12, 2022Updated 3 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Dec 12, 2022Updated 3 years ago
- ☆34Feb 9, 2018Updated 8 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- PoC for the taint-based ROP approach☆14Jul 16, 2023Updated 2 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆192Aug 3, 2025Updated 7 months ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- ShootCutMe an .LNK file creator tool for redteamer☆16Oct 2, 2024Updated last year
- executing JS from x86 code☆27May 9, 2019Updated 6 years ago
- ☆20Mar 21, 2024Updated last year
- ☆19Jul 29, 2022Updated 3 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Sep 4, 2021Updated 4 years ago
- Using fibers to run in-memory code.☆243Oct 19, 2023Updated 2 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆443Jul 10, 2024Updated last year
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- This is a repository of resource about Malware techniques☆825Apr 8, 2023Updated 2 years ago
- A collection of interesting ELF files for inspiration and testing☆31Jan 25, 2023Updated 3 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆674Dec 23, 2022Updated 3 years ago
- spoof return address☆79Apr 28, 2023Updated 2 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- miscellaneous scripts and programs☆277Jan 23, 2025Updated last year
- LD_PRELOAD rootkit☆139Feb 29, 2024Updated 2 years ago
- 💻 Windows 10 Kernel-mode rootkit☆32Sep 3, 2022Updated 3 years ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆591Aug 2, 2025Updated 7 months ago
- a small wiper malware programmed in c#☆59Nov 17, 2022Updated 3 years ago
- Shellcode Loader with Indirect Dynamic syscall Implementation , shellcode in MAC format, API resolving from PEB, Syscall calll and syscal…☆322Aug 2, 2023Updated 2 years ago
- Red Team tools, infrastructure, and hardware weaponized☆111Dec 29, 2025Updated 2 months ago
- Tools to bypass flawed SELinux policies using the init_module system call☆58Nov 20, 2023Updated 2 years ago
- Inspector-gadget (a.k.a. PSHAPE - Practical Support for Half-Automated Program Exploitation) is an open source tool which assists analyst…☆27Dec 17, 2019Updated 6 years ago
- ☆12Feb 4, 2025Updated last year