jephthai / EvilVMLinks
EvilVM compiler for information security research tools.
☆203Updated 3 years ago
Alternatives and similar repositories for EvilVM
Users that are interested in EvilVM are comparing it to the libraries listed below
Sorting:
- ☆34Updated 7 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆179Updated last year
- shell for nasm☆64Updated 5 years ago
- simple shellcode generator☆114Updated 8 years ago
- Vxheaven.org website's mirror☆174Updated 7 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆55Updated 3 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- Capcom Rootkit POC☆200Updated 8 years ago
- Cminer is a tool for enumerating the code caves in PE files.☆153Updated 2 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- Run executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.☆282Updated 8 years ago
- Small tool to run ELF binaries from memory with a given process name☆169Updated 4 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆71Updated 3 years ago
- Set of antianalysis techniques found in malware☆131Updated 2 years ago
- Automatically exported from code.google.com/p/corkami☆58Updated 4 years ago
- PE File Blessing - To continue or not to continue☆87Updated 5 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆123Updated 11 months ago
- Updated z0mbie MISTFALL engine☆16Updated 7 years ago
- Process Hollowing techniques as used in many file Crypters (C/C++)☆84Updated 5 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆183Updated 6 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆91Updated 2 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago
- a tool to make it easy and fast to test various forms of injection☆173Updated 6 years ago
- Demos of various (also non standard) persistence methods used by malware☆222Updated 2 years ago
- This is a simple example and explanation of obfuscating API resolution via hashing☆237Updated 5 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆96Updated 4 months ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- Search for code cave in all binaries☆285Updated last year
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆179Updated 12 years ago
- A kernel rootkit with remote command and control interface for windows☆110Updated 7 years ago