petikvx / MSIL-Ransom-Part-01
Source Code of MSIL Ransom
☆13Updated last year
Related projects: ⓘ
- using the Recycle Bin to insure persistence☆11Updated 2 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 2 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 5 years ago
- ☆31Updated this week
- Experiment with d_olex's firmware and conducting "preboot" attack☆15Updated last year
- Process injection via KernelCallbackTable☆14Updated 2 years ago
- Hooking Heavens Gate in a weekend☆13Updated 2 years ago
- really ?☆12Updated 6 months ago
- ☆14Updated this week
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆19Updated 2 years ago
- Dangling COM Keys Finder☆14Updated 2 years ago
- ☆16Updated 5 years ago
- Progress of learning kernel development☆13Updated last year
- C code to enable ETW tracing for Dotnet Assemblies☆28Updated 2 years ago
- ☆24Updated 5 months ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆12Updated 2 years ago
- A simple PE loader.☆25Updated last year
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Updated 2 years ago
- Here are some of my malware reversing papers that I will be publishing☆30Updated 2 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆18Updated last year
- ☆17Updated last year
- Using Thread Description To Hide Shellcodes☆13Updated 2 years ago
- Dump certificates from PE files in different formats☆36Updated 8 months ago
- ☆10Updated 5 months ago
- A repository filled with ideas to break/detect direct syscall techniques☆26Updated 2 years ago
- ☆14Updated 2 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆27Updated 2 years ago
- ☆28Updated this week
- ☆11Updated this week
- ☆14Updated last year
- ☆12Updated 3 years ago