guitmz / nastyLinks
Reverse text segment x64 ELF infector written in Assembly
☆20Updated 3 years ago
Alternatives and similar repositories for nasty
Users that are interested in nasty are comparing it to the libraries listed below
Sorting:
- In line function hooking LKM rootkit☆51Updated 5 years ago
- Abusing exceptions for code execution.☆111Updated 2 years ago
- TrashDBG the world's worse debugger☆23Updated 3 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆70Updated 3 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated last year
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆54Updated 3 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆72Updated last year
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- ☆28Updated 2 years ago
- ☆48Updated 2 months ago
- A journal for $6,000 Riot Vanguard bounty.☆64Updated last year
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆27Updated 5 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆71Updated 4 years ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆35Updated 4 years ago
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago
- Writeups for CTF challenges☆31Updated last year
- Small visualizator for PE files☆69Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated last year
- A novel technique to communicate between threads using the standard ETHREAD structure☆112Updated 4 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆105Updated 2 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆89Updated 3 years ago
- ☆25Updated 7 months ago
- Process Injection without R/W target memory and without creating a remote thread☆18Updated 3 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Updated last year
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆73Updated last year
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆84Updated 4 years ago
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆35Updated last year
- 2022 Updated Kernelmode-Code☆32Updated last year
- Anti-Debug encyclopedia contains methods used by malware to verify if they are executed under debugging. It includes the description of v…☆57Updated last year