cyberark / malware-research
☆33Updated last year
Related projects ⓘ
Alternatives and complementary repositories for malware-research
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago
- API Hammering with C++20☆34Updated 2 years ago
- ☆27Updated 3 months ago
- An initial proof of concept of a bootkit based on Cr4sh's DMABackdoorBoot☆59Updated last year
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- Cross-platform malware development library for anti-analysis techniques☆24Updated 3 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆30Updated last year
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆35Updated last year
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆36Updated 2 years ago
- the Open Source and Pure C++ Packer for eXecutables☆18Updated last year
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆76Updated 2 years ago
- An example of COM hijacking using a proxy DLL.☆25Updated 3 years ago
- Golang bindings for PE-sieve☆40Updated last year
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 2 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆61Updated 2 years ago
- Small visualizator for PE files☆67Updated last year
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆53Updated 2 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆20Updated 3 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- using the gpu to hide your payload☆47Updated 2 years ago
- Dell Driver EoP (CVE-2021-21551)☆32Updated 2 years ago
- ☆10Updated 2 years ago
- Enabled / Disable LSA Protection via BYOVD☆62Updated 2 years ago
- Here are some of my malware reversing papers that I will be publishing☆31Updated 2 years ago