Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.
☆194Aug 3, 2025Updated 8 months ago
Alternatives and similar repositories for vx
Users that are interested in vx are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows System Programming Experiments☆221Jun 13, 2022Updated 3 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Aug 18, 2020Updated 5 years ago
- C Header Only Library for Virii☆11Nov 17, 2020Updated 5 years ago
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- Original C Implementation of the Hell's Gate VX Technique☆1,179Jun 28, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆74Apr 11, 2022Updated 4 years ago
- Research code & papers from members of vx-underground.☆1,373Dec 7, 2021Updated 4 years ago
- Windows Kernel Programming Experiments☆84Sep 18, 2022Updated 3 years ago
- Piece of code to detect and remove hooks in IAT☆66May 30, 2022Updated 3 years ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆460Oct 25, 2021Updated 4 years ago
- A collection of my presentation materials.☆17Apr 29, 2024Updated last year
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆688Mar 11, 2024Updated 2 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- TartarusGate, Bypassing EDRs☆661Jan 25, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆208Mar 22, 2021Updated 5 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆26Apr 21, 2022Updated 3 years ago
- Project Ares is a Proof of Concept (PoC) loader written in C/C++ based on the Transacted Hollowing technique☆337Jan 16, 2022Updated 4 years ago
- C# Implementation of the Hell's Gate VX Technique☆217Jun 30, 2020Updated 5 years ago
- ☆165Sep 18, 2021Updated 4 years ago
- A list of all the DLLs export in C:\windows\system32\☆222Dec 22, 2021Updated 4 years ago
- A more stealthy variant of "DLL hollowing"☆366Mar 8, 2024Updated 2 years ago
- EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and e…☆289Mar 8, 2023Updated 3 years ago
- AV/EDR evasion via direct system calls.☆2,001Jan 1, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- NINA: No Injection, No Allocation x64 Process Injection Technique☆227Jun 9, 2020Updated 5 years ago
- KaynLdr is a Reflective Loader written in C/ASM☆552Dec 3, 2023Updated 2 years ago
- ☆84Aug 26, 2024Updated last year
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆721Aug 5, 2020Updated 5 years ago
- Some source code to demonstrate avoiding certain direct syscall detections by locating and JMPing to a legitimate syscall instruction wit…☆219Feb 20, 2023Updated 3 years ago
- Three Tiny Examples of Directly Using Vista's NtCreateUserProcess☆89Nov 9, 2015Updated 10 years ago
- Userland API Unhooker Project☆111Apr 4, 2026Updated last week
- Sources Codes of many Office Malwares☆18Sep 4, 2022Updated 3 years ago
- MalUnpack companion driver☆98Jun 17, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆28Feb 15, 2022Updated 4 years ago
- miscellaneous scripts and programs☆278Jan 23, 2025Updated last year
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆497Apr 1, 2021Updated 5 years ago
- Custom implementation of DbgHelp's MiniDumpWriteDump function. Uses static syscalls to replace low-level functions like NtReadVirtualMemo…☆127Jan 18, 2022Updated 4 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- Sleep Obfuscation☆826Dec 3, 2023Updated 2 years ago
- NT AUTHORITY\SYSTEM☆44Jul 8, 2020Updated 5 years ago