gentilkiwi / spectre_meltdown
☆73Updated 7 years ago
Alternatives and similar repositories for spectre_meltdown:
Users that are interested in spectre_meltdown are comparing it to the libraries listed below
- Samples about Microsoft RPC and native API calls in Windows C☆62Updated 8 years ago
- Passive UAC elevation using dll infection☆73Updated 10 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆43Updated 7 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆135Updated 7 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆45Updated 7 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆34Updated 6 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆61Updated 7 years ago
- Alina Spark - Point of Sales Trojan☆46Updated 10 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- Fileless Ransomware Example☆36Updated 7 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆50Updated 6 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- Blocks drivers from loading by using a name collision technique. #nsacyber☆47Updated 7 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 5 years ago
- Another Repo of Malware. Enjoy. <3☆59Updated 6 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- public bugs/proof of concepts☆48Updated 4 years ago
- ☆24Updated 6 years ago
- CANAPE Network Testing Tool☆33Updated 6 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆50Updated 6 years ago
- ☆63Updated 8 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆15Updated 7 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆58Updated 6 years ago
- Created by Jeffrey Martin via the GitHub Connector☆26Updated last month
- ☆39Updated 7 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆127Updated 8 years ago
- Portable utility to execute in memory a sequence of opcodes☆18Updated 8 years ago