pulpocaminante / Stuxnet
WMI virus, because funny
☆271Updated last month
Alternatives and similar repositories for Stuxnet:
Users that are interested in Stuxnet are comparing it to the libraries listed below
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆292Updated last year
- Nuke It From Orbit - remove AV/EDR with physical access☆257Updated 3 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆119Updated 3 months ago
- Tool designed to exfiltrate OneDrive Business OCR Data☆107Updated 2 months ago
- ☆342Updated last year
- A repository of credential stealer formats☆202Updated this week
- Generate a proxy dll for arbitrary dll☆168Updated 5 months ago
- Analyse your malware to surgically obfuscate it☆456Updated last month
- Patching "signtool.exe" to accept expired certificates for code-signing.☆276Updated 8 months ago
- Tool to decrypt App-Bound encrypted keys in Chrome 127+, using the IElevator COM interface with path validation and encryption protection…☆338Updated 4 months ago
- Damn Vulnerable UEFI☆272Updated 6 months ago
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆218Updated this week
- ☆64Updated last month
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆367Updated 3 months ago
- ☆186Updated last year
- Operating System Design Review: A systemic analysis of modern systems architecture☆306Updated last month
- Python tool to check rootkits in Windows kernel☆195Updated 3 weeks ago
- A collection of malware families and malware samples which use the Rust programming language.☆156Updated last year
- A repo for TPM sniffing greatness☆220Updated 3 months ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆655Updated 2 weeks ago
- Cybersecurity research results. Simple C/C++ and Python implementations☆212Updated last week
- Because AV evasion should be easy.☆676Updated 3 months ago
- AV/EDR Lab environment setup references to help in Malware development☆369Updated last month
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆261Updated last week
- The Definitive Guide To Process Cloning on Windows☆462Updated last year
- ☆297Updated 4 months ago
- A list of public attacks on BitLocker☆274Updated last month
- This is a Ghidra script that calls OPENAI to give meaning to decompiled functions☆122Updated 8 months ago
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆158Updated last month
- Important notes and topics on my journey towards mastering Windows Internals☆368Updated 10 months ago