redcode-labs / BMJ
Code snippets for bare-metal malware development
☆98Updated 3 years ago
Alternatives and similar repositories for BMJ:
Users that are interested in BMJ are comparing it to the libraries listed below
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆70Updated 3 years ago
- Binary Golf Library☆62Updated 4 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆54Updated 2 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 2 years ago
- Exercises from Designing BSD Rootkits working in 2020 with FreeBSD 12.2☆47Updated 2 years ago
- Binary Golf Grand Prix☆55Updated last month
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆229Updated 4 months ago
- Some of my windows kernel exploits for learning purposes☆123Updated 2 years ago
- Linux process injection PoCs☆30Updated last year
- LD_PRELOAD rootkit☆131Updated last year
- ☆44Updated 3 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆221Updated last year
- Small Rust programs that do weird things☆30Updated 3 years ago
- Cheat sheet of binary protections flags☆25Updated 4 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆125Updated 3 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆69Updated 2 years ago
- ☆10Updated 2 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆145Updated 2 years ago
- Anti-reverse Compilation☆33Updated 4 years ago
- TrashDBG the world's worse debugger☆23Updated 3 years ago
- ☆48Updated 4 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆27Updated 3 years ago
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆41Updated last year
- ☆50Updated 6 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆64Updated 3 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆74Updated 7 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 4 years ago
- ☆61Updated 10 months ago
- Abusing exceptions for code execution.☆110Updated 2 years ago
- ☆97Updated 3 years ago