redcode-labs / BMJ
Code snippets for bare-metal malware development
☆97Updated 3 years ago
Alternatives and similar repositories for BMJ:
Users that are interested in BMJ are comparing it to the libraries listed below
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆68Updated 2 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 2 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆52Updated 2 years ago
- Cheat sheet of binary protections flags☆23Updated 4 years ago
- Exercises from Designing BSD Rootkits working in 2020 with FreeBSD 12.2☆46Updated 2 years ago
- Linux process injection PoCs☆28Updated 9 months ago
- ☆44Updated 3 years ago
- Binary Golf Library☆63Updated 3 years ago
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆33Updated last year
- A curated list of awesome Windows Exploitation resources, and shiny things.☆73Updated 7 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆64Updated 2 years ago
- Academic project of Linux rootkit made for Bachelor Engineering Thesis.☆99Updated 6 months ago
- Binary Golf Grand Prix☆52Updated 3 weeks ago
- ☆46Updated 6 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆180Updated 3 years ago
- ☆112Updated 2 years ago
- Abusing exceptions for code execution.☆109Updated 2 years ago
- In line function hooking LKM rootkit☆51Updated 4 years ago
- ☆60Updated 7 months ago
- Red Team Operator: Malware Development Essentials Course☆98Updated 4 years ago
- Anti-reverse Compilation☆32Updated 3 years ago
- ☆27Updated 5 years ago
- TrashDBG the world's worse debugger☆23Updated 3 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- Winsock accept() Backdoor Implant.☆112Updated 4 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆220Updated last year
- ☆48Updated 4 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 4 years ago
- Windows APT Warfare, published by Packt☆66Updated last year