Public open-source code of malware Shamoon (aka Disttrack).
☆36May 28, 2015Updated 10 years ago
Alternatives and similar repositories for shamoon
Users that are interested in shamoon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Public open-source code of malware NetTraveler (aka TravNet).☆37May 28, 2015Updated 10 years ago
- Open-source decompilation of Disstrack☆12Oct 18, 2016Updated 9 years ago
- The internal Windows structures hack to create the in-process private ETW session☆14Feb 22, 2017Updated 9 years ago
- C++/C botnet using HTTP C&C☆16Jan 21, 2015Updated 11 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Oct 29, 2017Updated 8 years ago
- ☆21Aug 19, 2017Updated 8 years ago
- Trying for all arch detour stuff now☆11Feb 10, 2017Updated 9 years ago
- ☆11Mar 11, 2015Updated 11 years ago
- Kernel Context [template c++] Library - K C L. Your stl for work in linux/windows kernel !!!☆11Jul 24, 2018Updated 7 years ago
- pass game protect☆12Apr 26, 2014Updated 11 years ago
- another socks5 server , support linux, BSD , use epoll and kqueue technology☆13Jan 16, 2018Updated 8 years ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆16Mar 12, 2017Updated 9 years ago
- PE/PE +(64bit) Viewer (Qt 5.8)☆10Aug 3, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Minifilter Driver☆15Feb 10, 2017Updated 9 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Unofficial Iranian hackers group disk wiper malware aka "Shamoon" in .NET 2.0☆13Dec 23, 2018Updated 7 years ago
- WoW64 -> x64☆18Oct 1, 2016Updated 9 years ago
- kernel space code☆12Jun 8, 2019Updated 6 years ago
- ☆15Dec 26, 2017Updated 8 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- Quick analysis focusing on most important of a Malware or a Threat☆38Sep 4, 2023Updated 2 years ago
- Private set of tools for game hacking☆12Jan 25, 2015Updated 11 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- use crystalCPUID to identify vt-x & amd-v☆17Apr 8, 2015Updated 10 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆18Oct 10, 2014Updated 11 years ago
- Project aimed at creating a malware able to evolve and adapt to the various host machines through metamorphic modifications, spontaneous …☆44Sep 29, 2017Updated 8 years ago
- Example library for how to dynamically/statically hook/intercept unmanaged functions and APIs☆13Nov 9, 2022Updated 3 years ago
- Various libraries focused on examining/parsing NTFS-specific structures☆16Oct 25, 2015Updated 10 years ago
- ARMv7 detour function for hooking junk (no thumb support, unaligned accesses are not atomic)☆16Feb 5, 2017Updated 9 years ago
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Aug 13, 2020Updated 5 years ago
- Memory management is one of the most important parts of the operating system. KSM (Kernel Samepage Merging) in Linux kernel is a kind of…☆13Apr 8, 2018Updated 7 years ago
- lol amf协议解析☆15Nov 10, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆14Sep 11, 2017Updated 8 years ago
- some way to prevent process be killed☆27Aug 19, 2015Updated 10 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Apr 20, 2014Updated 11 years ago
- Windows PE file debugger☆11Aug 30, 2017Updated 8 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- IDA反-反调试插件 IDAStealth v1.3.3, created 06/28/2011, Jan Newger☆21Apr 4, 2018Updated 7 years ago
- ☆39May 31, 2017Updated 8 years ago