pulpocaminante / StuxnetLinks
WMI virus, because funny
☆280Updated 4 months ago
Alternatives and similar repositories for Stuxnet
Users that are interested in Stuxnet are comparing it to the libraries listed below
Sorting:
- Nuke It From Orbit - remove AV/EDR with physical access☆259Updated 5 months ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆291Updated last year
- ☆147Updated last month
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆119Updated 5 months ago
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆74Updated last month
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆59Updated 9 months ago
- ☆68Updated 4 months ago
- Generate a proxy dll for arbitrary dll☆180Updated 7 months ago
- Patching "signtool.exe" to accept expired certificates for code-signing.☆280Updated 10 months ago
- A delicious, but malicious SSL-VPN server 🌮☆227Updated 6 months ago
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆344Updated last week
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆322Updated 4 months ago
- ☆354Updated last year
- ☆188Updated last year
- Tool designed to exfiltrate OneDrive Business OCR Data☆114Updated 4 months ago
- A repository of credential stealer formats☆217Updated 2 months ago
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆312Updated 7 months ago
- Cybersecurity research results. Simple C/C++ and Python implementations☆229Updated this week
- Unorthodox and stealthy way to inject a DLL into the explorer using icons☆319Updated 2 weeks ago
- Centralized resource for listing and organizing known injection techniques and POCs☆515Updated last week
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆338Updated 9 months ago
- This is a Ghidra script that calls OPENAI to give meaning to decompiled functions☆125Updated 10 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆144Updated 4 months ago
- Evasion by machine code de-optimization.☆380Updated 10 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆143Updated last month
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆306Updated last week
- Reaping treasures from strings in remote processes memory☆261Updated 3 months ago
- Analyse your malware to surgically obfuscate it☆469Updated last week
- Collection of codes focused on Linux rootkits☆110Updated 3 months ago
- Because AV evasion should be easy.☆730Updated 6 months ago