petikvx / MSIL-Ransom-Part-01
Source Code of MSIL Ransom
☆13Updated 2 years ago
Alternatives and similar repositories for MSIL-Ransom-Part-01:
Users that are interested in MSIL-Ransom-Part-01 are comparing it to the libraries listed below
- Sources Codes of many MSIL malwares☆23Updated 2 years ago
- Process injection via KernelCallbackTable☆13Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 2 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆9Updated 2 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆12Updated 2 years ago
- ☆15Updated 2 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- Hooking Heavens Gate in a weekend☆13Updated 3 years ago
- Another Portable Executable files analysing stuff☆20Updated 13 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- really ?☆12Updated 11 months ago
- A simple PE loader.☆25Updated 2 years ago
- hyperv-driver-thread-detection-poc☆11Updated 4 years ago
- Code injection via ZwCreateSection, ZwUnmapViewOfSection. C++ example☆17Updated 3 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆19Updated 2 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Updated 4 years ago
- ☆7Updated 5 years ago
- Collection of IDA helpers☆15Updated 2 years ago
- Help deobfuscate VBScript☆15Updated 2 years ago
- Dump certificates from PE files in different formats☆38Updated last year
- Collection of my own detection rules☆15Updated last year
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆18Updated 2 years ago
- Loading and executing shellcode in C# without PInvoke.☆20Updated 3 years ago
- This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCo…☆15Updated 6 months ago
- An attempt at reversing WindowsDefender☆20Updated 4 months ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆10Updated 6 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆16Updated 6 years ago
- ☆28Updated 3 months ago
- Spoof parent process ID☆13Updated 6 years ago
- ☆15Updated 3 years ago