loneicewolf / LOJAX
LOJAX ROOTKIT (UEFI) +PDF Included[x]
☆29Updated 2 years ago
Alternatives and similar repositories for LOJAX:
Users that are interested in LOJAX are comparing it to the libraries listed below
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆19Updated last year
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆10Updated 6 years ago
- SMM rootkit similar to LoJax or MosaicRegressor☆108Updated last year
- Parser for a custom executable format from Hidden Bee malware (first stage)☆39Updated 5 months ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆26Updated 5 years ago
- TaskMgr Volatile Environment LPE☆13Updated 3 months ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆65Updated 3 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- Enter Product Key Volatile Environment LPE☆12Updated 3 months ago
- Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.☆13Updated 4 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- Rekall Memory Forensic Framework☆32Updated 5 years ago
- kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.☆17Updated 4 years ago
- 2022 Updated Kernelmode-Code☆32Updated 11 months ago
- Remote Assistance Volatile Environment LPE☆14Updated 3 months ago
- Collection of windows rootkits☆26Updated 4 years ago
- Another Portable Executable files analysing stuff☆20Updated 13 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆43Updated 7 years ago
- Infects PE files with a shellcode☆18Updated 6 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- Conti Ransomware Source Code☆20Updated 3 years ago
- Sysprep Volatile Environment LPE (2017)☆14Updated 3 months ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- Overwrite MBR and add own custom message☆15Updated 4 years ago
- ☆23Updated 9 years ago
- ☆36Updated last week
- fanny.bmp MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆39Updated 10 months ago
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆14Updated 4 years ago
- Clone repository for Source Code secret anti-forensic tools Marble Framework CIA, Leaked by WikiLeaks.☆30Updated 7 years ago