sukritisingh / Anti-Reversing-TechniquesLinks
Understanding some of the Anti-Reversing Techniques
☆11Updated 6 years ago
Alternatives and similar repositories for Anti-Reversing-Techniques
Users that are interested in Anti-Reversing-Techniques are comparing it to the libraries listed below
Sorting:
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 6 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated 2 years ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆18Updated 2 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆75Updated 4 years ago
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆81Updated 3 years ago
- Cryline project - It's a simple test ransomware for Windows OS without stable encryption. Pls use this source code for study purposes on…☆58Updated 7 months ago
- Simple API Hooks detector☆76Updated 3 years ago
- NT AUTHORITY\SYSTEM☆43Updated 5 years ago
- Simple x86 Trampoline Hook☆43Updated 3 years ago
- simple user-mode Rootkit☆107Updated 3 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆56Updated 5 months ago
- My notes while studying Windows exploitation☆192Updated 2 years ago
- ☆37Updated 10 months ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆36Updated 2 years ago
- Polymorphic ELF Runtime Crypter written in rust.☆21Updated 4 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- A simple Windows kernel rootkit.☆96Updated 7 months ago
- what the fuck is this shit☆25Updated 10 years ago
- Bypass Malware Time Delays☆108Updated 3 years ago
- ☆15Updated 5 years ago
- 2022 Updated Kernelmode-Code☆33Updated last year
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆74Updated 3 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆12Updated 4 years ago
- ☆75Updated 2 years ago
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆40Updated 4 years ago
- ☆29Updated 3 years ago
- Simple Packer PE File☆16Updated 6 years ago
- A Bumblebee-inspired Crypter☆79Updated 3 years ago
- Abusing exceptions for code execution.☆113Updated 2 years ago