jeffball55 / overwrite_mbr
A collection of tools for overwriting the MBR (Master Boot Record) of a machine with another file.
☆20Updated 10 years ago
Alternatives and similar repositories for overwrite_mbr:
Users that are interested in overwrite_mbr are comparing it to the libraries listed below
- A DLL that performs IAT hooking☆26Updated 6 years ago
- Passive UAC elevation using dll infection☆73Updated 10 years ago
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆33Updated 10 years ago
- Portable utility to execute in memory a sequence of opcodes☆18Updated 8 years ago
- Fileless Ransomware Example☆35Updated 7 years ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Updated 4 years ago
- Windows Malware☆41Updated 11 years ago
- KINS Banking Trojan☆62Updated 9 years ago
- Public open-source code of malware Shamoon (aka Disttrack).☆34Updated 9 years ago
- Malware monitor template based on MinHook☆16Updated 9 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆42Updated 8 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆35Updated 5 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆27Updated 8 years ago
- Alina Spark - Point of Sales Trojan☆46Updated 9 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆43Updated 3 years ago
- Alina POS Source Code + Rootkit☆23Updated 9 years ago
- ☆26Updated 7 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆93Updated 3 years ago
- The Grum Spam Bot☆20Updated 9 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆42Updated 7 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆63Updated 6 years ago
- Gozi-MBR-rootkit Bootkit Modified☆68Updated 8 years ago
- Extremely simple but inefficient x86-64 assembly obfuscation.☆35Updated 8 years ago
- Anti-Debugging detection and obufuscation techniques that involved the use of Win32 API functions.☆34Updated 8 years ago
- Bootkit for Windows 7☆26Updated 10 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Updated 13 years ago
- Power Loader botnet☆39Updated 9 years ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆90Updated 2 years ago
- Code that can be used as a reference, library, or inspiration for hacking Windows memory.☆50Updated 4 years ago
- medium-rare☆28Updated 5 years ago