guitmz / nastyLinks
Reverse text segment x64 ELF infector written in Assembly
☆20Updated 3 years ago
Alternatives and similar repositories for nasty
Users that are interested in nasty are comparing it to the libraries listed below
Sorting:
- Abusing exceptions for code execution.☆112Updated 2 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- A journal for $6,000 Riot Vanguard bounty.☆65Updated last year
- A Python script to download PDB files associated with a Portable Executable (PE)☆125Updated 7 months ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆67Updated 3 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆55Updated 3 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Updated 2 years ago
- ☆71Updated 2 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆93Updated 3 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆11Updated 2 years ago
- ☆163Updated 4 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Updated 2 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆71Updated 3 years ago
- Windows Kernel Programming Experiments☆80Updated 3 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆114Updated 4 years ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆18Updated 2 years ago
- API Hooking Engine on Windows 10☆12Updated last year
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆75Updated 3 years ago
- Report and exploit of CVE-2023-36427☆90Updated last year
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆121Updated 3 years ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆33Updated 6 years ago
- An ELF / PE binary packer written in pure C, made for fun☆98Updated last year
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆36Updated last year
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆112Updated 2 years ago
- Windows kernel PDB data parsed into YAML☆41Updated 10 months ago
- A few examples of how to trap virtual memory access on Windows.☆34Updated 9 months ago
- Exploitable drivers, you know what I mean☆154Updated last year