petikvx / MSIL-Ransom-Part-01Links
Source Code of MSIL Ransom
☆14Updated 2 years ago
Alternatives and similar repositories for MSIL-Ransom-Part-01
Users that are interested in MSIL-Ransom-Part-01 are comparing it to the libraries listed below
Sorting:
- Sources Codes of many MSIL malwares☆24Updated 2 years ago
- ☆19Updated 2 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Updated 4 years ago
- Sources Codes of many Office Malwares☆17Updated 2 years ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆42Updated 2 years ago
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- An Assembly x86 code that shows Windows MessageBox kept as simple as possible.☆11Updated 2 years ago
- Another Portable Executable files analysing stuff☆21Updated 14 years ago
- ☆7Updated 6 years ago
- Example of C# heap injector for x64 and x86 shellcodes☆14Updated 2 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆25Updated 3 years ago
- Some ELF Malwares☆10Updated 3 years ago
- Decompiled NotPetya File Encryptor Code☆14Updated 2 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆22Updated last year
- Analyzers for Portable Executable anomalies and other malware behavior.☆32Updated last year
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆10Updated 3 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- NT AUTHORITY\SYSTEM☆38Updated 5 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Updated 3 years ago
- General malware analysis stuff☆37Updated 10 months ago
- Read my blog for more info -☆31Updated 4 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- Manually perform syscalls without going through any external API or DLL.☆19Updated 2 years ago
- Overwrite MBR and add own custom message☆17Updated 5 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- ☆16Updated 3 years ago
- Hooking Heavens Gate in a weekend☆13Updated 3 years ago