guitmz / nastyLinks
Reverse text segment x64 ELF infector written in Assembly
☆20Updated 4 years ago
Alternatives and similar repositories for nasty
Users that are interested in nasty are comparing it to the libraries listed below
Sorting:
- Abusing exceptions for code execution.☆113Updated 2 years ago
- In line function hooking LKM rootkit☆51Updated 5 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆67Updated 3 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆73Updated 3 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆56Updated 3 years ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆17Updated 2 years ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆124Updated 8 months ago
- TrashDBG the world's worse debugger☆23Updated 3 years ago
- Windows Kernel Programming Experiments☆82Updated 3 years ago
- MalUnpack companion driver☆97Updated last year
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆75Updated 3 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆114Updated 4 years ago
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 3 years ago
- a PE Loader and Windows API tracer. Useful in malware analysis.☆143Updated 3 years ago
- ☆72Updated 2 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆32Updated 6 years ago
- ☆74Updated last year
- Small visualizator for PE files☆70Updated 2 years ago
- POC of a better implementation of GetProcAddress for ntdll using binary search☆108Updated last year
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆74Updated 4 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated 2 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆89Updated last year
- Binary Ninja plugin for exploring Structured Exception Handlers☆82Updated last year
- Anti-Debug encyclopedia contains methods used by malware to verify if they are executed under debugging. It includes the description of v…☆61Updated last year
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- ☆164Updated 4 years ago