guitmz / nasty
Reverse text segment x64 ELF infector written in Assembly
☆20Updated 3 years ago
Alternatives and similar repositories for nasty:
Users that are interested in nasty are comparing it to the libraries listed below
- Abusing exceptions for code execution.☆110Updated 2 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆71Updated last year
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆99Updated last year
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆70Updated 3 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆87Updated 3 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- ☆71Updated 2 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆54Updated 2 years ago
- Report and exploit of CVE-2023-36427☆90Updated last year
- ☆28Updated 2 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆71Updated 3 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆33Updated last year
- A few examples of how to trap virtual memory access on Windows.☆29Updated 4 months ago
- In line function hooking LKM rootkit☆51Updated 5 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- A journal for $6,000 Riot Vanguard bounty.