mzakyz666 / WikiLeaks-Marble-CIA
Clone repository for Source Code secret anti-forensic tools Marble Framework CIA, Leaked by WikiLeaks.
☆30Updated 8 years ago
Alternatives and similar repositories for WikiLeaks-Marble-CIA:
Users that are interested in WikiLeaks-Marble-CIA are comparing it to the libraries listed below
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆43Updated 7 months ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 7 years ago
- Program to leak anti-virus behaviour and such☆15Updated 6 years ago
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆33Updated 11 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18Updated 6 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆21Updated 7 years ago
- Ammyy v3 Source Code leak , with ❤️ <3☆37Updated 8 years ago
- Power Loader botnet☆39Updated 10 years ago
- Class implementation of PowerLoader injection technique☆29Updated 8 years ago
- Simple little rootkit made in C☆13Updated 4 years ago
- Various Crypter Project☆51Updated 11 years ago
- ☆22Updated 4 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆33Updated 5 years ago
- TaskMgr Volatile Environment LPE☆13Updated 4 months ago
- ☆13Updated 8 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆18Updated 2 months ago
- Simple code generation library developed in C intended for code generation in Kernel mode☆16Updated 2 years ago
- Kernel mode windows NT API logger☆22Updated 5 years ago
- Sysprep Volatile Environment LPE (2017)☆14Updated 4 months ago
- Code Injection technique written in cpp language☆31Updated 7 years ago
- Project aimed at creating a malware able to evolve and adapt to the various host machines through metamorphic modifications, spontaneous …☆43Updated 7 years ago
- Enter Product Key Volatile Environment LPE☆12Updated 4 months ago
- HTTP BOTNET☆8Updated 2 years ago
- The Grum Spam Bot☆20Updated 10 years ago
- Bypass UAC by abusing shell protocol handlers☆14Updated 3 years ago
- Exploits I've authored☆60Updated 5 years ago
- PoC for detecting and dumping process hollowing code injection☆51Updated 6 years ago
- Basic disassembly technique to slow down disasm process☆10Updated 5 years ago
- User-mode part of Zerokit platform☆20Updated 6 years ago