Understanding some of the Anti-Reversing Techniques
☆11Oct 6, 2019Updated 6 years ago
Alternatives and similar repositories for Anti-Reversing-Techniques
Users that are interested in Anti-Reversing-Techniques are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Jun 15, 2020Updated 5 years ago
- This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.☆13Jan 27, 2023Updated 3 years ago
- Rootkit Arsenal 2nd Source Code☆15Aug 6, 2013Updated 12 years ago
- Linux rootkit for kernel 4.9.133☆16Jan 6, 2019Updated 7 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆31Jun 23, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.☆18Oct 9, 2020Updated 5 years ago
- Take webcam snaps by sending malicious link☆13Jun 9, 2020Updated 5 years ago
- Code for the post "Elliptic Curves as Python Objects" implementing elliptic curve point addition over rational numbers.☆21Jun 9, 2020Updated 5 years ago
- A Unix rootkit☆17Aug 9, 2020Updated 5 years ago
- Elgamal Encryption using Elliptic Curve Cryptography in Python 2.7☆13Nov 17, 2018Updated 7 years ago
- Static Library For Windows Drivers☆41Dec 13, 2025Updated 4 months ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆18Apr 10, 2023Updated 3 years ago
- JSDoc Abstract Syntax Tree☆22Jun 11, 2021Updated 4 years ago
- exploitpack extracted from a honeynet which is being prepared by intruduers to be used as an exploitation infrastructure☆12Feb 17, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Penetration Test / Read Team - C# tools repository☆55Dec 23, 2021Updated 4 years ago
- ☆17Aug 13, 2020Updated 5 years ago
- Fill automatically login and password fields when a registration form is displayed using bugmenot accounts.☆17Dec 9, 2012Updated 13 years ago
- AdminX it's a Malware to execute process as some users from a Windows OS☆11May 4, 2023Updated 2 years ago
- Tools that i have gatherd and study to see how thay work and learned why theses tools execute there attacks. I started to have the intres…☆11Dec 25, 2020Updated 5 years ago
- Hook discord's rendering functions without patching .text.☆14Nov 14, 2021Updated 4 years ago
- automating the zig release process☆11Nov 19, 2025Updated 5 months ago
- Application to easily download and install radare2 on android devices☆17May 28, 2019Updated 6 years ago
- ☆20Aug 4, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- PoC for DHCP vulnerability (NAME:WRECK) in FreeBSD☆15Apr 14, 2021Updated 5 years ago
- A redteam tool to obfuscate IPv4 addresses to evade AV or Application Firewalls☆18Mar 18, 2020Updated 6 years ago
- ☆23Oct 28, 2020Updated 5 years ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 4 years ago
- ☆12Oct 10, 2023Updated 2 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆33Sep 24, 2025Updated 6 months ago
- Collection Of Terrible CNC/Qbot Panels☆11Aug 8, 2025Updated 8 months ago
- ☆12Jul 31, 2022Updated 3 years ago
- NOGO is a packaging script that creates fully undetectable payloads specializing in disabling anti-virus. Created for pentesting (crippli…☆11Apr 23, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- The RKN caused problems all over Russian Internet. This is list of services which suffered from RKN blockings activity.☆18Dec 24, 2018Updated 7 years ago
- little helping scripts that I use daily☆11Aug 30, 2021Updated 4 years ago
- This project is created for research into antivirus evasion by unhooking.☆18Sep 2, 2021Updated 4 years ago
- A command line tic-tac-toe game in Golang☆12Oct 14, 2024Updated last year
- ☆12May 13, 2024Updated last year
- NTP Scanner and 'monlist' checker☆13Sep 1, 2015Updated 10 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 4 years ago