petikvx / vx-ezine
Collection of ezine about virii
☆15Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for vx-ezine
- ☆15Updated 2 years ago
- Collection of IDA helpers☆15Updated 2 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆10Updated 6 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆16Updated last year
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆18Updated 8 months ago
- This repository will present all Information interest about Thanatos Ransomware after analysis☆8Updated 5 years ago
- A DLL that serves OutputDebugString content over a TCP connection☆34Updated 3 years ago
- A tiny Windows hook library for x86/x64☆11Updated last year
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Updated last year
- genpatch is IDA plugin that generates a python script for patching binary☆31Updated 11 months ago
- kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.☆13Updated 4 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆18Updated last year
- ☆18Updated 5 years ago
- ☆30Updated 6 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆35Updated 2 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- Some of CrackMes made by me :)☆17Updated 2 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆10Updated 2 years ago
- Plugin for NOPing instructions in IDA☆13Updated 6 months ago
- Enter Product Key Volatile Environment LPE☆11Updated 2 years ago
- ☆26Updated 3 weeks ago
- ☆13Updated 9 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 2 years ago
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆36Updated 3 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆24Updated 3 years ago
- Rekall Memory Forensic Framework☆29Updated 5 years ago