jeffball55 / overwrite_mbr
A collection of tools for overwriting the MBR (Master Boot Record) of a machine with another file.
☆21Updated 10 years ago
Related projects: ⓘ
- Public open-source code of malware Shamoon (aka Disttrack).☆30Updated 9 years ago
- Passive UAC elevation using dll infection☆70Updated 9 years ago
- Public open-source code of malware NetTraveler (aka TravNet).☆32Updated 9 years ago
- KINS Banking Trojan☆61Updated 9 years ago
- Alina Spark - Point of Sales Trojan☆46Updated 9 years ago
- Various Crypter Project☆50Updated 10 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆91Updated 3 years ago
- Process Hollowing techniques as used in many file Crypters (C/C++)☆82Updated 3 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆34Updated 5 years ago
- ☆42Updated this week
- Windows Reverse Shell shellcode☆60Updated 2 years ago
- Simple windows backdoor command shell.☆20Updated 6 years ago
- A minimal tool to extract shellcode from 64-bit PE binaries.☆48Updated 3 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆63Updated 6 years ago
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆32Updated 10 years ago
- ☆26Updated 7 years ago
- Simple runtime crypter in C++.☆44Updated 9 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆54Updated 7 years ago
- Inject code into a legitimate process☆141Updated 9 years ago
- Power Loader botnet☆38Updated 9 years ago
- Dexter v2 - Point of Sales Trojan☆26Updated 9 years ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆88Updated 2 years ago
- Extremely simple but inefficient x86-64 assembly obfuscation.☆34Updated 8 years ago
- Fileless Ransomware Example☆35Updated 7 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆129Updated 10 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆41Updated 6 years ago
- Ring3 Rootkit Backdoor.☆40Updated 9 years ago
- Carberp Banking Trojan☆110Updated 9 years ago
- Gozi-MBR-rootkit Bootkit Modified☆68Updated 7 years ago
- PoC dlls for Task Scheduler COM Hijacking☆89Updated 8 years ago