Shinao / Malicious
ASM Malicious code - PE infector
☆70Updated 8 years ago
Alternatives and similar repositories for Malicious:
Users that are interested in Malicious are comparing it to the libraries listed below
- Bunch of techniques potentially used by malware to detect analysis environments☆158Updated 8 years ago
- Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.☆104Updated 10 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆163Updated 8 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆87Updated last year
- Educational virus written in Assembly that infects 32-bit ELF executables on Linux using the data segment infection method☆78Updated 8 years ago
- Linux bind shell with anti-reverse engineering techniques☆285Updated 8 years ago
- A simple MBR hijack demonstration☆179Updated 2 years ago
- Disassembling binaries to neat asm sources.☆20Updated 7 years ago
- NASM Standard Library for shellcode☆69Updated 8 years ago
- Blogging about reversing "script kiddie" style malware.☆98Updated 9 years ago
- Cross Architecture Shellcode in C☆200Updated 8 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆50Updated 8 years ago
- Program for cryptanalyzing xor "encryption" with variable key length☆44Updated 15 years ago
- ☆67Updated 3 years ago
- Hacking Games in a Hacked Game☆29Updated 9 years ago
- Snowman decompiler☆107Updated 7 years ago
- ☆137Updated 3 years ago
- Data and class remodeling library☆67Updated 9 years ago
- Multiple radare2 rpipe scripts☆61Updated 7 years ago
- Run basic functions from stripped binaries cross platform☆111Updated 8 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Updated 4 years ago
- A CrackMe powered with a virtual machine.☆44Updated 9 years ago
- A Reverse-Engineer's best friend.☆72Updated 7 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆44Updated 9 years ago
- Cross Platform Malware Development Framework☆68Updated 9 years ago
- webui repository for radare2☆95Updated 6 months ago
- Advanced buffer overflow and memory corruption security challenges☆188Updated 3 years ago
- ☆49Updated 7 years ago