This tool creates almost undetectabe trojan virus to exploit windows machine.
☆135May 2, 2017Updated 8 years ago
Alternatives and similar repositories for HackSpy-Trojan-Exploit
Users that are interested in HackSpy-Trojan-Exploit are comparing it to the libraries listed below
Sorting:
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- Anti-AV compilation☆44Oct 4, 2013Updated 12 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- Enumerates very, very large directories quickly by directly using kernel syscalls. For POSIX and Windows. WARNING THIS IS OBSOLETE. USE B…☆15Aug 13, 2014Updated 11 years ago
- ☆13Aug 12, 2015Updated 10 years ago
- OpenHIPS prevents exploitation of Windows systems☆35Jan 7, 2013Updated 13 years ago
- Windows Optimizer☆27Dec 25, 2012Updated 13 years ago
- Maltrace is a simple syscall tracer for Windows implemented through the use of PIN.☆24Apr 10, 2013Updated 12 years ago
- ☆15Jan 14, 2016Updated 10 years ago
- ☆12May 12, 2014Updated 11 years ago
- An experimental rootkit for Android☆26Feb 22, 2013Updated 13 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Aug 30, 2015Updated 10 years ago
- Try to transport the tcpip stack of ReactOS to Windows XP.☆17Feb 27, 2014Updated 12 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆41Jul 25, 2014Updated 11 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆15Sep 19, 2015Updated 10 years ago
- lkm rootkit☆15May 12, 2014Updated 11 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Mar 12, 2014Updated 11 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 10 years ago
- Clickjacking Proof-of-Concept Exploit☆25Oct 1, 2020Updated 5 years ago
- Bootkits Revisited☆39Jun 3, 2014Updated 11 years ago
- Remote Administration Toolkit (or Trojan) for POSiX (Linux/Unix) system working as a Web Service☆173Jun 15, 2019Updated 6 years ago
- The Horrific Omnipotent Rootkit☆23Mar 17, 2017Updated 8 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Feb 1, 2026Updated last month
- Windows PE file debugger