jephthai / EvilVM
EvilVM compiler for information security research tools.
☆191Updated 2 years ago
Alternatives and similar repositories for EvilVM:
Users that are interested in EvilVM are comparing it to the libraries listed below
- shell for nasm☆64Updated 4 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 4 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆225Updated 5 years ago
- Persisting in the Windows registry "invisibly"☆340Updated 6 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆175Updated 7 months ago
- Shellcoding utilities☆221Updated 4 years ago
- Cminer is a tool for enumerating the code caves in PE files.☆149Updated last year
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆182Updated 6 years ago
- a tool to make it easy and fast to test various forms of injection☆172Updated 5 years ago
- Search for code cave in all binaries☆278Updated 8 months ago
- Capcom Rootkit POC☆192Updated 8 years ago
- AndrewSpecial, dumping lsass' memory stealthily and bypassing "Cilence" since 2019.☆386Updated 5 years ago
- A list of ways to execute code on Windows using legitimate Windows tools☆306Updated 5 years ago
- simple shellcode generator☆112Updated 8 years ago
- A "tiny" meterpreter stager☆126Updated 5 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆87Updated last year
- A Bind Shell Using the Fax Service and a DLL Hijack☆327Updated 4 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆58Updated 12 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆94Updated 4 years ago
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- ☆34Updated 7 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- Teaching old shellcode new tricks☆205Updated 7 years ago
- POC viruses I have created to demo some ideas☆59Updated 4 years ago
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆281Updated 7 years ago
- Neutering Sysmon via driver unload☆227Updated 2 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆132Updated 5 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆64Updated 7 years ago
- This is a rich-featured Visual Basic macro code for use during Penetration Testing assignments, implementing various advanced post-exploi…☆142Updated 3 years ago
- A simple, extensible C&C beaconing system.☆99Updated 7 years ago