loneicewolf / fanny.bmp
fanny.bmp MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)
☆33Updated 5 months ago
Related projects: ⓘ
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆18Updated 6 months ago
- NT AUTHORITY\SYSTEM☆37Updated 4 years ago
- ☆29Updated this week
- Here are some of my malware reversing papers that I will be publishing☆30Updated 2 years ago
- ☆33Updated last year
- A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps on…☆12Updated 9 months ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆25Updated this week
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- ☆21Updated this week
- ☆30Updated last year
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆10Updated 6 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆23Updated 4 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 6 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 3 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆19Updated 3 years ago
- ☆48Updated this week
- Parser for a custom executable format from Hidden Bee malware (first stage)☆39Updated last week
- ☆22Updated this week
- Cross-platform malware development library for anti-analysis techniques☆23Updated 3 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆33Updated 3 years ago
- LOJAX ROOTKIT (UEFI) +PDF Included[x]☆25Updated last year
- POC for a basic C2 server using the python aiohttp framework☆13Updated 4 years ago
- Static Decryptor for IcedID Malware☆18Updated last year
- An Xdbg Plugin of the ERC Library.☆26Updated 7 months ago
- ☆26Updated this week
- ☆53Updated 2 years ago
- ☆19Updated this week
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆16Updated last year
- Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excelle…☆24Updated 3 years ago