petikvx / vx-ezineLinks
Collection of ezine about virii
☆17Updated 3 years ago
Alternatives and similar repositories for vx-ezine
Users that are interested in vx-ezine are comparing it to the libraries listed below
Sorting:
- Some ELF Malwares☆10Updated 3 years ago
- ☆19Updated 3 years ago
- ☆34Updated 7 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆13Updated 3 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Updated 5 years ago
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆46Updated last year
- API hashing written in C to load APIs indirectly using CRC32 hashing☆14Updated 5 years ago
- ☆31Updated 3 months ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- Sources Codes of many MSIL malwares☆24Updated 3 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆56Updated 3 years ago
- ☆37Updated 9 months ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆11Updated 7 years ago
- Neutralize KEPServerEX anti-debugging techniques☆33Updated 2 years ago
- Process Hollowing demonstration & explanation☆35Updated 4 years ago
- Progress of learning kernel development☆14Updated 3 years ago
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆20Updated last year
- Sources Codes of many Office Malwares☆17Updated 3 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 4 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆37Updated 10 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆27Updated 3 years ago
- Process injection via KernelCallbackTable☆13Updated 3 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆23Updated 2 years ago
- NT AUTHORITY\SYSTEM☆43Updated 5 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 6 years ago
- An injector that use PT_LOAD technique☆12Updated 3 years ago
- Open repository of binary sample collections for binary analysis.☆16Updated 4 years ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆57Updated 11 months ago
- Source Code of MSIL Ransom☆14Updated 2 years ago
- Linux kernel internals' notes☆20Updated last week