lem0nSec / Alcatraz
An example of Windows self-replicating malware.
☆10Updated 2 years ago
Alternatives and similar repositories for Alcatraz:
Users that are interested in Alcatraz are comparing it to the libraries listed below
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- AIDA64DRIVER Elevation of Privilege Vulnerability☆13Updated 6 months ago
- run process as PPL Antimalware☆10Updated last year
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- really ?☆12Updated last year
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆16Updated 10 months ago
- Offensive Assembly code snippets.☆12Updated last year
- ☆21Updated last year
- Hooking Heavens Gate in a weekend☆13Updated 3 years ago
- A PoC tool for exploiting leaked process and thread handles☆31Updated last year
- Manually perform syscalls without going through any external API or DLL.☆18Updated 2 years ago
- ☆25Updated 2 years ago
- This repo for Windows x32-x64 Kernel/Driver/User Mode Exploitation writeups and exploits☆23Updated last year
- Process Injection: APC Injection☆31Updated 4 years ago
- ☆12Updated last year
- Dangling COM Keys Finder☆17Updated 3 years ago
- the Open Source and Pure C++ Packer for eXecutables☆20Updated 2 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆20Updated 2 weeks ago
- Windows kernel☆12Updated 4 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆27Updated 3 years ago
- Code injection via ZwCreateSection, ZwUnmapViewOfSection. C++ example☆17Updated 3 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- ☆24Updated 2 years ago
- Just another casual shellcode native loader☆24Updated 3 years ago
- ☆39Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- A simple Nim stager (w/ fiber execution)☆17Updated 3 years ago
- Callstack spoofing using a VEH because VEH all the things.☆21Updated last month
- ☆30Updated last year
- ☆26Updated 3 years ago