petikvx / MSIL-Ransom-Part-01
Source Code of MSIL Ransom
☆13Updated 2 years ago
Alternatives and similar repositories for MSIL-Ransom-Part-01:
Users that are interested in MSIL-Ransom-Part-01 are comparing it to the libraries listed below
- really ?☆12Updated last year
- Sources Codes of many MSIL malwares☆23Updated 2 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- Loading and executing shellcode in C# without PInvoke.☆20Updated 3 years ago
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- Hooking Heavens Gate in a weekend☆13Updated 3 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆32Updated 10 months ago
- Help deobfuscate VBScript☆15Updated 2 years ago
- Another Portable Executable files analysing stuff☆21Updated 13 years ago
- Enter Product Key Volatile Environment LPE☆12Updated 4 months ago
- An Assembly x86 code that shows Windows MessageBox kept as simple as possible.☆11Updated 2 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆26Updated 3 weeks ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆20Updated 2 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆10Updated 6 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Updated last year
- Yara sort☆13Updated this week
- Progress of learning kernel development☆14Updated 2 years ago
- NT AUTHORITY\SYSTEM☆39Updated 4 years ago
- Decrypt Wireless Passwords On Windows☆14Updated 4 years ago
- ☆10Updated 3 years ago
- ☆26Updated 2 months ago
- ☆7Updated 5 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆21Updated last year
- Process Hollowing in Rust with Process Executable Relocation Support for both 32 and 64 bit architecture environments.☆17Updated 3 months ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Updated 2 years ago
- Currently proof-of-concept☆16Updated 3 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆32Updated 3 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆18Updated 2 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Updated 4 years ago