shailrshah / ELF-VirusLinks
A simple ELF Virus that can execute malacious code, infect other ELF files, and execute the host file's code normally.
☆42Updated 7 years ago
Alternatives and similar repositories for ELF-Virus
Users that are interested in ELF-Virus are comparing it to the libraries listed below
Sorting:
- ELF packer/crypter that aims to create hardened and stealthy troyans☆55Updated 3 years ago
- 来自Freebuf评论区,一个UEFI马.☆49Updated 8 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Updated 5 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆50Updated 5 years ago
- Gozi-MBR-rootkit Bootkit Modified☆71Updated 8 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 3 years ago
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆11Updated 8 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Updated 5 years ago
- A collection of anti disassembly techniques☆19Updated 8 years ago
- Protects deletion of files with a specified extension using a kernel-mode driver.☆76Updated 7 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 6 years ago
- exploit termdd.sys(support kb4499175)☆60Updated 6 years ago
- Simple Polymorphic x86_64 Runtime Code Segment Cryptor☆58Updated 7 years ago
- Various Crypter Project☆52Updated 11 years ago
- a open source rat from china☆26Updated 8 years ago
- PoC executable packer using resources☆31Updated 9 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- ☆45Updated 7 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Introductory software reverse engineering tutorial for beginners☆35Updated 6 years ago
- Project aimed at creating a malware able to evolve and adapt to the various host machines through metamorphic modifications, spontaneous …☆44Updated 8 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆94Updated 6 years ago
- A way to backdoor every process☆67Updated 8 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- Introduce you to shellcode development.☆23Updated 9 years ago
- x86_64 linux rootkit using debug registers☆53Updated 3 years ago
- Windows Malware☆41Updated 12 years ago
- Collection of windows rootkits☆26Updated 5 years ago
- Source code of my KeygenMe V7 challenge☆22Updated 7 years ago