jephthai / EvilVM
EvilVM compiler for information security research tools.
☆188Updated 2 years ago
Alternatives and similar repositories for EvilVM:
Users that are interested in EvilVM are comparing it to the libraries listed below
- shell for nasm☆62Updated 4 years ago
- Capcom Rootkit POC☆185Updated 7 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆211Updated 4 years ago
- ☆41Updated 3 years ago
- Proxy system calls over an RPC channel☆96Updated 2 years ago
- a tool to make it easy and fast to test various forms of injection☆172Updated 5 years ago
- A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.☆163Updated 3 years ago
- Generate very tiny reverse shell binaries for Linux~☆74Updated 4 years ago
- Alphanumeric Shellcode (x86) Encoder☆73Updated 2 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆324Updated 4 years ago
- A "tiny" meterpreter stager☆127Updated 5 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆180Updated 5 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆94Updated 4 years ago
- POC viruses I have created to demo some ideas☆59Updated 4 years ago
- Cminer is a tool for enumerating the code caves in PE files.☆143Updated last year
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆219Updated 5 years ago
- Injects additional machine instructions into various binary formats.☆271Updated 9 months ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆81Updated last year
- A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2☆138Updated last year
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆367Updated 3 years ago
- Small tool to run ELF binaries from memory with a given process name☆152Updated 3 years ago
- Neutering Sysmon via driver unload☆222Updated 2 years ago
- This is a simple example and explanation of obfuscating API resolution via hashing☆228Updated 4 years ago
- A repo full of example gscripts☆98Updated 5 years ago
- FLARE Kernel Shellcode Loader☆176Updated 5 years ago
- Driver Initial Reconnaissance Tool☆120Updated 4 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆34Updated 5 years ago
- PoC for proxying COM objects when hijacking☆199Updated 5 years ago
- AndrewSpecial, dumping lsass' memory stealthily and bypassing "Cilence" since 2019.☆385Updated 5 years ago