sukritisingh / Anti-Reversing-TechniquesLinks
Understanding some of the Anti-Reversing Techniques
☆12Updated 5 years ago
Alternatives and similar repositories for Anti-Reversing-Techniques
Users that are interested in Anti-Reversing-Techniques are comparing it to the libraries listed below
Sorting:
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆28Updated 5 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- ☆28Updated 2 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated last year
- ☆16Updated 3 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆71Updated 4 years ago
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆37Updated 3 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆11Updated 4 years ago
- ☆25Updated 7 months ago
- XssBot-Модульный резидентный бот с супер админкой☆11Updated 2 years ago
- C++ Multi-Stage Semi-Polymorphic Malware Loader.☆9Updated 3 years ago
- Simple API Hooks detector☆73Updated 2 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆43Updated 9 months ago
- Next gen process injection technique☆54Updated 4 years ago
- Basic disassembly technique to slow down disasm process☆11Updated 5 years ago
- Compact MBR Bootkit for Windows☆52Updated 3 years ago
- Overwrite MBR and add own custom message☆17Updated 5 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆34Updated 3 years ago
- Abusing exceptions for code execution.☆111Updated 2 years ago
- Simple x86 Trampoline Hook☆40Updated 2 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆72Updated last year
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆26Updated 5 years ago
- PoC of a UEFI Petya ransomware☆44Updated 2 years ago
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Updated 2 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Updated last year
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆57Updated 3 years ago