记录一下自己的病毒分析成果
☆255Feb 26, 2021Updated 5 years ago
Alternatives and similar repositories for Virus-Analysis
Users that are interested in Virus-Analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 使用MFC编写的病毒技术合集☆619Jul 27, 2019Updated 6 years ago
- 使用C++控制台实现的加壳器☆83Mar 11, 2019Updated 7 years ago
- 使用纯C/C++编写的ShellCode生成框架☆452May 25, 2019Updated 6 years ago
- 对160个Crackme的详细分析记录☆486Jun 15, 2019Updated 6 years ago
- 记录游戏逆向的分析过程☆512Sep 2, 2025Updated 6 months ago
- 绕3环的shellcode免杀框架☆574Mar 19, 2021Updated 5 years ago
- PE文件打包器。将一系列的插件dll(寄生dll),打包捆绑到目标exe中,以寄生的方式改变程序的原有行为。寄生的dll完全手动装配,隐藏执行;宿主被恢复后,会被寄生dll强势再感染。☆24Jan 18, 2013Updated 13 years ago
- 进程保护、进程过滤的小工程、主要亮点是在内核中对操作系统中的用户进行管理☆16Nov 5, 2014Updated 11 years ago
- Fastjson vulnerability quickly exploits the framework(fastjson漏洞快速利用框架)☆1,389Dec 16, 2022Updated 3 years ago
- 恶意代码逃逸源代码 http://payloads.online☆758Mar 7, 2022Updated 4 years ago
- 免杀技术大杂烩---乱拳也打不死老师傅☆1,094Mar 29, 2021Updated 4 years ago
- 远控免杀系列文章及配套工具,汇总测试了互联网上的几十种免杀工具、113种白名单免杀方式、8种代码编译免杀、若干免杀实战技术,并对免杀效果进行了一一测试,为远控的免杀和杀软对抗免杀提供参考。☆5,037Sep 14, 2024Updated last year
- 《WINDOWS黑客编程技术详解》,作者甘迪文,2018年12月由人民邮电出版社出版,是一本面向黑客编程初学者的书,较为全面的地总结黑客编程技术。其内容重在实践,着重剖析技术实现原理,向读者讲解黑客编程技术的实现方法。☆419May 9, 2022Updated 3 years ago
- 该资源为系统安全和逆向分析实验,包括作者从零学习恶意代码分析、病毒逆向分析的工具及样本,基础性文章,希望对您有所帮助~☆908Feb 9, 2026Updated last month
- Windows对抗沙箱和虚拟机的方法总结☆402Apr 22, 2020Updated 5 years ago
- 将shellcode用rsa加密并动态编译exe,自带几种反沙箱技术。☆518Jul 9, 2020Updated 5 years ago
- Cooolis-ms是一个包含了Metasploit Payload Loader、Cobalt Strike External C2 Loader、Reflective DLL injection的代码执行工具,它的定位在于能够在静态查杀上规避一些我们将要执行且含有特征的…☆932Jan 7, 2026Updated 2 months ago
- Using Windows Hook to make a CLI WebShellKill☆45Feb 4, 2019Updated 7 years ago
- 记录流量的http(s)代理+分布式被动漏洞扫描☆24Jun 30, 2019Updated 6 years ago
- Position Independent Windows Shellcode Written in C☆297Aug 28, 2018Updated 7 years ago
- 白阁文库是白泽Sec安全团队维护的一个漏洞POC和EXP公开项目☆1,491Oct 12, 2023Updated 2 years ago
- 总结了20+.Net反序列化文章,持续更新☆749Apr 3, 2024Updated last year
- Proof of concept of VMSA-2017-0012☆41Jul 27, 2017Updated 8 years ago
- Cobalt Strike系列☆2,417Dec 3, 2023Updated 2 years ago
- Some ways to inject a DLL into a alive process☆365Apr 26, 2018Updated 7 years ago
- A JSP backdoor that enables under Tomcat hiding arbitrary JSP files, in addition to their access logs.☆216Mar 31, 2019Updated 6 years ago
- 翻译国外的@WebBreacher的安全/渗透测试/红队面试题,有部分参考作用☆283Aug 5, 2023Updated 2 years ago
- ☆35Jun 17, 2022Updated 3 years ago
- 主流供应商的一些攻击性漏洞汇总☆808Nov 8, 2021Updated 4 years ago
- 各种数据库的利用姿势☆1,033Jan 3, 2025Updated last year
- Windows 驱动开发基础函数库,供个人使用☆15Nov 4, 2019Updated 6 years ago
- Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe)☆267Dec 19, 2019Updated 6 years ago
- Weblogic一键漏洞检测工具,V1.5,更新时间:20200730☆2,267May 22, 2023Updated 2 years ago
- An example of a downloader written in NodeJS.☆24Apr 17, 2021Updated 4 years ago
- 病毒&免杀脚本&乱七八糟的脚本☆118Nov 13, 2023Updated 2 years ago
- 检测绝大部分所谓的内存免杀马☆734Sep 15, 2022Updated 3 years ago
- 逆向火绒安全软件驱动——sysdiag☆158Jan 15, 2018Updated 8 years ago
- shellcodeloader☆1,747Dec 11, 2020Updated 5 years ago
- Rapid generation ShellCode☆60Sep 12, 2017Updated 8 years ago