mav8557 / virus
Polymorphic ELF Virus
☆16Updated 3 years ago
Alternatives and similar repositories for virus:
Users that are interested in virus are comparing it to the libraries listed below
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- a stage1 DLL loader with sleep obfuscation☆35Updated 2 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 2 years ago
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆32Updated 3 years ago
- using the gpu to hide your payload☆56Updated 2 years ago
- ☆33Updated 2 years ago
- ☆19Updated 3 years ago
- It's what all the kids are talking about☆12Updated last year
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆36Updated 3 years ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆26Updated 5 years ago
- A simple PE loader.☆25Updated 2 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13Updated last year
- A PoC packer written in Rust!☆67Updated 2 years ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆32Updated last year
- ☆12Updated 2 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆26Updated 6 months ago
- A payload delivery system which embeds payloads in an executable's icon file!☆72Updated last year
- API Hammering with C++20☆45Updated 2 years ago
- Red Team Operation's Defense Evasion Technique.☆52Updated 9 months ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆20Updated last month
- Linux Sleep Obfuscation☆94Updated last year
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆18Updated 3 months ago
- Cross-platform malware development library for anti-analysis techniques☆24Updated 3 years ago
- Callstack spoofing using a VEH because VEH all the things.☆17Updated last week
- A repository filled with ideas to break/detect direct syscall techniques☆27Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- A simple Nim stager (w/ fiber execution)☆16Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆38Updated 2 years ago