petikvx / vx-ezineLinks
Collection of ezine about virii
☆17Updated 3 years ago
Alternatives and similar repositories for vx-ezine
Users that are interested in vx-ezine are comparing it to the libraries listed below
Sorting:
- ☆34Updated 7 years ago
- Some ELF Malwares☆10Updated 3 years ago
- ☆20Updated 3 years ago
- Sources Codes of many MSIL malwares☆24Updated 3 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆27Updated 3 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 4 years ago
- Display Languages Volatile Environment LPE☆12Updated 4 months ago
- Neutralize KEPServerEX anti-debugging techniques☆32Updated 2 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆55Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.☆18Updated 5 years ago
- Rootkit Arsenal 2nd Source Code☆14Updated 12 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 4 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆24Updated 2 years ago
- ☆30Updated 2 months ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated 4 years ago
- Simple unpacking script for Ezuri ELF Crypter☆34Updated 4 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 4 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆57Updated 3 months ago
- NT AUTHORITY\SYSTEM☆42Updated 5 years ago
- Component Services Volatile Environment LPE☆13Updated 4 months ago
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆48Updated 11 months ago
- Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.☆14Updated 5 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆14Updated 5 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆37Updated 10 years ago
- Various Crypter Project☆10Updated 11 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆39Updated 3 years ago