lem0nSec / Alcatraz
An example of Windows self-replicating malware.
☆10Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Alcatraz
- run process as PPL Antimalware☆11Updated last year
- API Hammering with C++20☆34Updated 2 years ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆14Updated 4 months ago
- A simple Linux in-memory .so loader☆27Updated last year
- An example of COM hijacking using a proxy DLL.☆25Updated 3 years ago
- ☆12Updated 2 years ago
- really ?☆12Updated 8 months ago
- ☆10Updated this week
- Dangling COM Keys Finder☆14Updated 3 years ago
- ☆21Updated 6 months ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆25Updated 3 months ago
- Just another casual shellcode native loader☆24Updated 2 years ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆39Updated 7 months ago
- ☆27Updated 2 years ago
- Hooking Heavens Gate in a weekend☆13Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- ☆12Updated last year
- Exploiting the KsecDD Windows driver through Server Silos☆24Updated 2 weeks ago
- Offensive Assembly code snippets.☆10Updated last year
- Small tool to play with IOCs caused by Imageload events☆38Updated last year
- ☆17Updated last year
- A Practical example of ELAM (Early Launch Anti-Malware)☆31Updated 3 years ago
- using the Recycle Bin to insure persistence☆11Updated 2 years ago
- In-memory hiding technique☆42Updated 5 months ago
- A simple PE loader.☆25Updated last year
- A repository filled with ideas to break/detect direct syscall techniques☆26Updated 2 years ago