Shinao / MaliciousLinks
ASM Malicious code - PE infector
☆72Updated 8 years ago
Alternatives and similar repositories for Malicious
Users that are interested in Malicious are comparing it to the libraries listed below
Sorting:
- A simple MBR hijack demonstration☆181Updated 3 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆95Updated last month
- Educational virus written in Assembly that infects 32-bit ELF executables on Linux using the data segment infection method☆79Updated 9 years ago
- Windows XP 32-Bit Bootkit☆145Updated 11 years ago
- Hacking Games in a Hacked Game☆29Updated 10 years ago
- Blogging about reversing "script kiddie" style malware.☆97Updated 10 years ago
- j0llydmper is a windows service that allows you to dump furtively and automaticaly some contents of USB disks just plugged in your comput…☆39Updated 13 years ago
- Runtime DirectX9 Hooking☆16Updated 3 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆160Updated 9 years ago
- A linux rootkit works on kernel 4.0.X or higher☆37Updated 9 years ago
- ☆45Updated 8 years ago
- ViDi Visual Disassembler (experimental)☆79Updated 4 months ago
- Passive UAC elevation using dll infection☆75Updated 11 years ago
- PE Infector/Cryptor source code☆20Updated 3 years ago
- Disassembling binaries to neat asm sources.☆20Updated 8 years ago
- ☆72Updated 4 years ago
- NASM Standard Library for shellcode☆69Updated 9 years ago
- Maintaining an official release at http://split-code.com/cda.html . Tool for recording, filtering, and hacking function calls within appl…☆68Updated 11 years ago
- A script to reverse-engineer anti-virus signatures☆32Updated 12 years ago
- Diary of a reverse-engineer☆39Updated 8 years ago
- Small script to assemble/disassemble from CLI☆23Updated 3 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 9 years ago
- A C/C++ library to parse Windows portable executables written with speed and stability in mind.☆67Updated 10 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Updated 11 years ago
- Clone of hidden tear written in C++☆70Updated 5 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆171Updated 9 years ago
- Translate regular Assembly into Extended Instructions☆88Updated 13 years ago
- Bootkits Revisited☆40Updated 11 years ago
- A Reverse-Engineer's best friend.☆71Updated 8 years ago