petikvx / MSIL-Ransom-Part-01Links
Source Code of MSIL Ransom
☆14Updated 2 years ago
Alternatives and similar repositories for MSIL-Ransom-Part-01
Users that are interested in MSIL-Ransom-Part-01 are comparing it to the libraries listed below
Sorting:
- Sources Codes of many MSIL malwares☆24Updated 3 years ago
- ☆19Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Updated 3 years ago
- Sources Codes of many Office Malwares☆17Updated 3 years ago
- Process injection via KernelCallbackTable☆13Updated 4 years ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆41Updated 2 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆20Updated 4 years ago
- Collection of my own detection rules☆20Updated last month
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Updated 3 years ago
- ☆16Updated 4 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆58Updated 6 months ago
- Another Portable Executable files analysing stuff☆21Updated 14 years ago
- Listing UDP connections with remote address without sniffing.☆31Updated 2 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Updated 2 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆33Updated last month
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆20Updated last year
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆15Updated 5 years ago
- Read my blog for more info -☆31Updated 4 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆23Updated 2 years ago
- Decompiled NotPetya File Encryptor Code☆17Updated 3 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆21Updated 5 years ago
- Dump certificates from PE files in different formats☆38Updated 2 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆50Updated 4 years ago
- A set of small utilities, helpers for PIN tracers☆36Updated 4 months ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- 💻 Windows 10 Kernel-mode rootkit☆32Updated 3 years ago
- Nice try reading NTDLL from disk, nerd.☆19Updated 3 years ago