darkspik3 / Valhalla-ezinesLinks
☆34Updated 7 years ago
Alternatives and similar repositories for Valhalla-ezines
Users that are interested in Valhalla-ezines are comparing it to the libraries listed below
Sorting:
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆73Updated 3 years ago
 - ☆57Updated 3 years ago
 - Code snippets for bare-metal malware development☆98Updated 3 years ago
 - "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
 - ☆28Updated 6 years ago
 - In line function hooking LKM rootkit☆51Updated 5 years ago
 - An Xdbg Plugin of the ERC Library.☆26Updated last year
 - Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
 - How to set up 2 VirtualBox VM to debug kernel driver using windbg☆56Updated 3 years ago
 - Windows GPU rootkit PoC by Team Jellyfish☆37Updated 10 years ago
 - Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.☆14Updated 5 years ago
 - Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆56Updated 2 months ago
 - This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
 - ☆37Updated 8 months ago
 - NT AUTHORITY\SYSTEM☆42Updated 5 years ago
 - A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆55Updated 6 years ago
 - The following repository contains a modified version of SUNBURST with cracekd hashes, comments and annotations.☆56Updated 4 years ago
 - Offensive go lang series☆35Updated 5 years ago
 - A small library helping to parse commandline parameters (for C/C++)☆58Updated 5 months ago
 - fanny.bmp cleaned MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆47Updated 3 months ago
 - A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆53Updated 4 years ago
 - Another Portable Executable files analysing stuff☆21Updated 14 years ago
 - ☆137Updated 7 months ago
 - Fileless persistence, attacks and anti-forensic capabilties.☆94Updated 6 years ago
 - Python wrappers for mal_unpack☆37Updated 2 years ago
 - Set of antianalysis techniques found in malware☆131Updated 2 years ago
 - ☆18Updated 6 years ago
 - An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆67Updated 3 years ago
 - ☆23Updated 4 years ago
 - A novel technique to communicate between threads using the standard ETHREAD structure☆114Updated 4 years ago