Silenc3IsGold3n / oldmalwaresourcecodeLinks
Just some sources from forever ago (none were made by me)
☆7Updated 7 years ago
Alternatives and similar repositories for oldmalwaresourcecode
Users that are interested in oldmalwaresourcecode are comparing it to the libraries listed below
Sorting:
- Capture Webcam Reflective Dll☆8Updated 9 years ago
- C & Shellcode Playground..☆11Updated 7 years ago
- User-mode part of Zerokit platform☆20Updated 6 years ago
- module for certexfil☆15Updated 2 years ago
- ☆7Updated 5 years ago
- ☆20Updated 5 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Updated 6 years ago
- My solutions for random crackmes and other challenges☆11Updated 5 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19Updated 5 years ago
- find and kill injectedThreads from memory☆11Updated 9 years ago
- Sysprep Volatile Environment LPE (2017)☆14Updated 6 months ago
- Analysis and Modification Tool for Executables☆17Updated 6 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago
- 🐧 A simple kernel-level rootkit☆20Updated 9 years ago
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆16Updated 9 years ago
- ☆16Updated 7 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- Jar Protector - Jar Crypter☆14Updated 7 years ago
- Access windows machine remotely on HTTP☆12Updated 4 years ago
- Remote Assistance Volatile Environment LPE☆14Updated 6 months ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- Library for Windows XML Event Log (EVTX) data types☆18Updated 9 months ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆14Updated 4 years ago
- Notes about reverse engineering the Petya2017 ransomware☆18Updated 7 years ago
- Notes and goodies to make binary exploitation life easier☆10Updated 6 years ago
- Common Malware Techniques☆13Updated 2 years ago
- Zerokit shared code☆16Updated 6 years ago
- Post-explotation Hacks☆14Updated 6 years ago
- C# code to run PIC using CreateThread☆17Updated 6 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago