Shinao / MaliciousLinks
ASM Malicious code - PE infector
☆72Updated 8 years ago
Alternatives and similar repositories for Malicious
Users that are interested in Malicious are comparing it to the libraries listed below
Sorting:
- A simple MBR hijack demonstration☆180Updated 3 years ago
- Runtime DirectX9 Hooking☆16Updated 3 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆159Updated 9 years ago
- Educational virus written in Assembly that infects 32-bit ELF executables on Linux using the data segment infection method☆79Updated 8 years ago
- Windows XP 32-Bit Bootkit☆145Updated 10 years ago
- Small script to assemble/disassemble from CLI☆22Updated 3 years ago
- ☆45Updated 8 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆92Updated this week
- Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.☆105Updated 11 years ago
- ☆70Updated 3 years ago
- This repository contains a docker container dedicated to reverse engineering☆84Updated 7 years ago
- Diary of a reverse-engineer☆39Updated 7 years ago
- Maintaining an official release at http://split-code.com/cda.html . Tool for recording, filtering, and hacking function calls within appl…☆66Updated 10 years ago
- Hacking Games in a Hacked Game☆28Updated 10 years ago
- PE Infector/Cryptor source code☆21Updated 3 years ago
- Blogging about reversing "script kiddie" style malware.☆98Updated 10 years ago
- NASM Standard Library for shellcode☆69Updated 9 years ago
- j0llydmper is a windows service that allows you to dump furtively and automaticaly some contents of USB disks just plugged in your comput…☆39Updated 13 years ago
- BitErrant☆59Updated 8 years ago
- A 512-byte bootloader displaying ASCII Goatse on boot.☆29Updated 4 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Updated 9 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- Implementation of the SMM rootkit "The Watcher"☆128Updated 3 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- A linux rootkit works on kernel 4.0.X or higher☆37Updated 9 years ago
- Blog series about Pwn Adventure 3: http://blog.keyidentity.com/tag/pwnadventure/☆38Updated 8 years ago
- Passive UAC elevation using dll infection☆75Updated 10 years ago
- Experiments on C/C++ Exploits☆21Updated 5 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago