XaFF-XaFF / MBR-Overwrite-with-custom-message
Overwrite MBR and add own custom message
☆15Updated 4 years ago
Alternatives and similar repositories for MBR-Overwrite-with-custom-message:
Users that are interested in MBR-Overwrite-with-custom-message are comparing it to the libraries listed below
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆12Updated 3 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- Simple keylogger written in C# which is ready for modifications.☆13Updated 3 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆31Updated 3 years ago
- Manually perform syscalls without going through any external API or DLL.☆18Updated last year
- Process Hollowing demonstration & explanation☆35Updated 3 years ago
- A simple PE loader.☆25Updated 2 years ago
- Just another casual shellcode native loader☆24Updated 3 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆72Updated 3 years ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆49Updated last year
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆18Updated 2 weeks ago
- Infects PE files with a shellcode☆17Updated 6 years ago
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- silence file system monitoring components by hooking their minifilters☆54Updated last year
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆18Updated 2 years ago
- Simple PE Packer Which Encrypts .text Section☆51Updated 7 years ago
- 2022 Updated Kernelmode-Code☆31Updated 10 months ago
- Process Injection: APC Injection☆29Updated 4 years ago
- Another Portable Executable files analysing stuff☆20Updated 13 years ago
- kernel to user mode APC injector☆44Updated 2 years ago
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆32Updated 3 years ago
- Next gen process injection technique☆44Updated 4 years ago
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆16Updated 6 months ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆54Updated 3 years ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆21Updated 4 years ago
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆81Updated last year
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆106Updated last year
- Cross-platform malware development library for anti-analysis techniques☆24Updated 3 years ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆24Updated 5 years ago