gelven4sec / NotPetyaAgain
PoC of a UEFI Petya ransomware
☆40Updated 2 years ago
Alternatives and similar repositories for NotPetyaAgain:
Users that are interested in NotPetyaAgain are comparing it to the libraries listed below
- A attempt at replicating BLACKLOTUS capabilities, whilst not acting as a direct mimic.☆87Updated last year
- Bypass Malware Time Delays☆100Updated 2 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 2 years ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆25Updated 5 years ago
- ☆27Updated 10 months ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆32Updated last year
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆95Updated last year
- using the gpu to hide your payload☆53Updated 2 years ago
- An initial proof of concept of a bootkit based on Cr4sh's DMABackdoorBoot☆61Updated last year
- user-mode Rootkit☆102Updated 2 years ago
- Piece of code to detect and remove hooks in IAT☆62Updated 2 years ago
- A kernel vulnerability used to achieve arbitrary read-write on Windows prior to July 2022☆104Updated 2 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆71Updated 3 years ago
- ☆68Updated last year
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 2 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆87Updated 2 years ago
- A Poc on blocking Procmon from monitoring network events☆100Updated 2 years ago
- 2022 Updated Kernelmode-Code☆31Updated 10 months ago
- A proof of concept I developed to improve Gargoyle back in 2018 to achieve true memory obfuscation from position independent code☆43Updated 4 months ago
- ☆34Updated 2 years ago
- Small PoC of using a Microsoft signed executable as a lolbin.☆133Updated last year
- It's pointy and it hurts!☆122Updated 2 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆46Updated 8 months ago
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆32Updated 2 years ago
- Red Team Operation's Defense Evasion Technique.☆52Updated 7 months ago
- API Hammering with C++20☆44Updated 2 years ago
- ☆41Updated 2 years ago
- A improved memory obfuscation primitive using a combination of special and 'normal' Asynchronous Procedural Calls☆105Updated 4 months ago
- A small tool I made to dump the export table of PE files. The primary use case was intended for use within DLL proxying.☆69Updated 2 years ago