mav8557 / virusLinks
Polymorphic ELF Virus
☆17Updated 3 years ago
Alternatives and similar repositories for virus
Users that are interested in virus are comparing it to the libraries listed below
Sorting:
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- using the gpu to hide your payload☆59Updated 3 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 2 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆66Updated 3 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆24Updated 5 months ago
- Golang bindings for PE-sieve☆42Updated last year
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆31Updated 5 years ago
- Bypass Malware Time Delays☆104Updated 3 years ago
- Red Team Operation's Defense Evasion Technique.☆55Updated last year
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated 2 years ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆34Updated last year
- An interactive mock C2 server☆17Updated 2 years ago
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆38Updated 4 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- Windows NTLM Authentication Backdoor☆18Updated 3 years ago
- ☆37Updated 6 months ago
- 💻 Windows 10 Kernel-mode rootkit☆32Updated 3 years ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- API Hammering with C++20☆49Updated 3 years ago
- Repo containing my public talks☆23Updated 2 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆28Updated last year
- Linux Sleep Obfuscation☆106Updated last year
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Updated 2 years ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆15Updated last year
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Updated 2 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆129Updated 4 years ago
- a stage1 DLL loader with sleep obfuscation☆37Updated 2 years ago
- A simple Nim stager (w/ fiber execution)☆18Updated 3 years ago
- Deleting Shadow Copies In Pure C++☆114Updated 2 years ago