jephthai / EvilVMLinks
EvilVM compiler for information security research tools.
☆203Updated 3 years ago
Alternatives and similar repositories for EvilVM
Users that are interested in EvilVM are comparing it to the libraries listed below
Sorting:
- shell for nasm☆65Updated 5 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- PE File Blessing - To continue or not to continue☆87Updated 6 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆185Updated 6 years ago
- Intro to Assembly Optimization stream repo☆30Updated 4 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆178Updated last year
- Cminer is a tool for enumerating the code caves in PE files.☆156Updated 2 years ago
- a tool to make it easy and fast to test various forms of injection☆173Updated 6 years ago
- Capcom Rootkit POC☆207Updated 8 years ago
- Small tool to run ELF binaries from memory with a given process name☆172Updated 4 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆45Updated 4 years ago
- ☆34Updated 8 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆58Updated 4 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- simple shellcode generator☆114Updated 8 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆132Updated last year
- Run executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.☆284Updated 8 years ago
- Proxy system calls over an RPC channel☆100Updated 3 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆214Updated 5 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆95Updated last month
- The first Linux hooking framework to allow merging two binary files into one!☆97Updated 8 months ago
- This is a simple example and explanation of obfuscating API resolution via hashing☆237Updated 5 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆74Updated 3 years ago
- GPU rootkit PoC by Team Jellyfish☆100Updated 10 years ago
- A way to backdoor every process☆68Updated 8 years ago
- C Header Only Library for Virii☆12Updated 5 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆11Updated 7 years ago
- Winsock accept() Backdoor Implant.☆118Updated 4 years ago