jephthai / EvilVMLinks
EvilVM compiler for information security research tools.
☆204Updated 3 years ago
Alternatives and similar repositories for EvilVM
Users that are interested in EvilVM are comparing it to the libraries listed below
Sorting:
- shell for nasm☆65Updated 5 years ago
- Capcom Rootkit POC☆206Updated 8 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆178Updated last year
- The first Linux hooking framework to allow merging two binary files into one!☆96Updated 6 months ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆127Updated last year
- Vxheaven.org website's mirror☆177Updated 7 years ago
- a tool to make it easy and fast to test various forms of injection☆173Updated 6 years ago
- simple shellcode generator☆114Updated 8 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- Cminer is a tool for enumerating the code caves in PE files.☆154Updated 2 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆183Updated 6 years ago
- Run executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.☆281Updated 8 years ago
- Intro to Assembly Optimization stream repo☆26Updated 4 years ago
- Injects additional machine instructions into various binary formats.☆287Updated last year
- Small tool to run ELF binaries from memory with a given process name☆170Updated 4 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆228Updated 6 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆74Updated 3 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆55Updated 3 years ago
- Demos of various (also non standard) persistence methods used by malware☆221Updated 2 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆216Updated 5 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆93Updated 3 weeks ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago
- Proxy system calls over an RPC channel☆99Updated 3 years ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆181Updated 12 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- Stealthy backdoor for Windows operating systems☆282Updated 5 years ago
- PE File Blessing - To continue or not to continue☆87Updated 6 years ago
- This is a simple example and explanation of obfuscating API resolution via hashing☆238Updated 5 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago