leminski / WikileaksCIA
☆16Updated this week
Related projects: ⓘ
- ☆10Updated this week
- lkm rootkit☆14Updated 10 years ago
- Hypervisor-base File Monitoring : monitoring file-related activities in VMs on XEN hypervisor☆9Updated 6 years ago
- Cross-referencing network communication for detecting Advanced Persistent Threat (APT) malware☆6Updated 9 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 11 years ago
- ☆10Updated this week
- simple rootkit for computer security class☆13Updated 11 years ago
- Decrypt the initial dropper of various exploit kits☆10Updated 7 years ago
- wow64 syscall filter☆13Updated 9 years ago
- PE32 binary + W32 payload☆12Updated 7 years ago
- does reflective dll injection☆8Updated 10 years ago
- ☆11Updated this week
- Yet Another Repetitive Rootkit☆8Updated 11 years ago
- A simple kernel-level rootkit☆17Updated 8 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆41Updated 11 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 9 years ago
- ☆11Updated 9 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 3 years ago
- ☆9Updated 7 years ago
- ☆6Updated 10 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 8 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Updated 6 years ago
- ☆10Updated this week
- Shellcode tracer☆15Updated 8 years ago
- ☆13Updated this week
- ☆12Updated this week
- ☆11Updated this week
- dll injection library☆9Updated 9 years ago