petikvx / vx-ezineLinks
Collection of ezine about virii
☆16Updated 2 years ago
Alternatives and similar repositories for vx-ezine
Users that are interested in vx-ezine are comparing it to the libraries listed below
Sorting:
- ☆16Updated 2 years ago
- Some ELF Malwares☆9Updated 3 years ago
- ☆34Updated 7 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- General malware analysis stuff☆37Updated 9 months ago
- Tools for analyzing Windows containers and break container's isolation☆31Updated 2 years ago
- Some of CrackMes made by me :)☆18Updated 3 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆14Updated 4 years ago
- ☆25Updated last year
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 4 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆11Updated 6 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆23Updated 3 years ago
- ☆18Updated 4 months ago
- A utility that can be used to launch an executable with a DLL injected☆20Updated last year
- RDP THIEF - inject dll to remote desktop process (mstsc.exe) and steal user credentials.☆13Updated 4 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆19Updated last year
- Hash collisions and their exploitations☆9Updated 3 years ago
- Yara sort☆14Updated this week
- kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.☆17Updated 4 years ago
- A wrapper for capstone for bearparser☆14Updated 2 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆22Updated last year
- Collection of IDA helpers☆16Updated 2 years ago
- Rekall Memory Forensic Framework☆32Updated 5 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Updated 2 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 3 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 4 years ago