mav8557 / virusLinks
Polymorphic ELF Virus
☆17Updated 3 years ago
Alternatives and similar repositories for virus
Users that are interested in virus are comparing it to the libraries listed below
Sorting:
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆67Updated 3 years ago
- using the gpu to hide your payload☆63Updated 3 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆21Updated this week
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- Bypass Malware Time Delays☆108Updated 3 years ago
- A simple Nim stager (w/ fiber execution)☆19Updated 3 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated 2 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 3 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- A simple PE loader.☆27Updated 3 years ago
- Golang bindings for PE-sieve☆42Updated 2 years ago
- Linux Sleep Obfuscation☆106Updated last year
- Monarch - The Adversary Emulation Toolkit☆64Updated 11 months ago
- Red Team Operation's Defense Evasion Technique.☆56Updated last year
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13Updated 2 years ago
- Repo containing my public talks☆23Updated 2 years ago
- ☆33Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 3 years ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆34Updated 2 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆24Updated 7 months ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆29Updated last year
- Another AMSI bypass - but in C++.☆24Updated 2 years ago
- ☆37Updated 9 months ago
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆40Updated 4 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆131Updated 4 years ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆43Updated last year