guitmz / nasty
Reverse text segment x64 ELF infector written in Assembly
☆20Updated 3 years ago
Alternatives and similar repositories for nasty:
Users that are interested in nasty are comparing it to the libraries listed below
- Abusing exceptions for code execution.☆109Updated 2 years ago
- In line function hooking LKM rootkit☆51Updated 4 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- TrashDBG the world's worse debugger☆23Updated 2 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆69Updated last year
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆68Updated 2 years ago
- ☆28Updated 2 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆72Updated 3 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 4 years ago
- A journal for $6,000 Riot Vanguard bounty.☆61Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆26Updated 5 years ago
- ☆25Updated 3 months ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆90Updated 3 years ago
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 3 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆33Updated last year
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆16Updated last year
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆62Updated 2 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆9Updated last year
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆52Updated 2 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆25Updated 3 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆74Updated 3 years ago
- ☆27Updated 5 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆96Updated last year
- short crackme for Windows XP SP3 (32 bit version). ring0 stuff. IMO very fun x-)☆23Updated last year
- UEFI bootkit: Hardware Implant. In-Progress☆13Updated 2 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104Updated 4 years ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆37Updated 2 years ago