mzakyz666 / WikiLeaks-Marble-CIA
Clone repository for Source Code secret anti-forensic tools Marble Framework CIA, Leaked by WikiLeaks.
☆30Updated 7 years ago
Related projects: ⓘ
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆25Updated 6 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆39Updated last week
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆41Updated 6 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆18Updated 3 years ago
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆32Updated 10 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18Updated 6 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- ☆34Updated this week
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆12Updated 7 years ago
- Program to leak anti-virus behaviour and such☆14Updated 5 years ago
- Sysprep Volatile Environment LPE (2017)☆13Updated 2 years ago
- Ammyy v3 Source Code leak , with ❤️ <3☆36Updated 7 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆14Updated 5 years ago
- Project aimed at creating a malware able to evolve and adapt to the various host machines through metamorphic modifications, spontaneous …☆40Updated 6 years ago
- Dodgy reflective DLL injector PoC for 32-bit Windows☆15Updated 6 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- Penetration Testing Tool for Windows 7 => 10☆15Updated 6 years ago
- Public open-source code of malware NetTraveler (aka TravNet).☆32Updated 9 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆23Updated 4 years ago
- Ransomware Using CryptoAPI☆13Updated 6 years ago
- Kernel mode windows NT API logger☆21Updated 5 years ago
- ☆26Updated this week
- Exploits I've authored☆59Updated 5 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆18Updated 8 years ago
- Basic disassembly technique to slow down disasm process☆10Updated 5 years ago
- NT AUTHORITY\SYSTEM☆37Updated 4 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆28Updated 5 years ago
- Proof of concept memory anti-forensic toolkit designed for hiding various artifacts inside the memory dump during memory acquisition on M…☆10Updated 4 years ago
- Reverse Windows shell over TLS☆18Updated 8 years ago