gentilkiwi / spectre_meltdown
☆72Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for spectre_meltdown
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆41Updated 6 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆130Updated 11 years ago
- Samples about Microsoft RPC and native API calls in Windows C☆59Updated 8 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆60Updated 7 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆133Updated 7 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆44Updated 7 years ago
- Alina Spark - Point of Sales Trojan☆46Updated 9 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 5 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆36Updated 5 years ago
- Shellcode Of Death☆38Updated 11 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆34Updated 5 years ago
- Hive solves a critical problem for the malware operators at the CIA.☆63Updated 7 years ago
- public bugs/proof of concepts☆47Updated 3 years ago
- Fileless Ransomware Example☆35Updated 7 years ago
- Passive UAC elevation using dll infection☆71Updated 10 years ago
- A Generic Windows Memory Scraping Tool☆70Updated 7 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆45Updated 4 years ago
- Perform MiTM attack and remove encryption on Windows Remote Registry Protocol.☆33Updated 7 years ago
- All TMF files that I extracted from Microsoft PDBs.☆12Updated 5 years ago
- Alina POS Source Code + Rootkit☆23Updated 9 years ago
- PowerShell Runspace Connect-Back Shell☆26Updated 8 years ago
- A simple shellcode runner☆20Updated 10 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆37Updated 11 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆126Updated 8 years ago
- ARP Man-in-the-Middle tool☆27Updated 2 months ago
- The Horrific Omnipotent Rootkit☆21Updated 7 years ago
- Miscellaneous projects related to attacking Windows.☆27Updated 5 years ago
- Dexter v2 - Point of Sales Trojan☆26Updated 9 years ago