sukritisingh / Anti-Reversing-Techniques
Understanding some of the Anti-Reversing Techniques
☆12Updated 5 years ago
Alternatives and similar repositories for Anti-Reversing-Techniques
Users that are interested in Anti-Reversing-Techniques are comparing it to the libraries listed below
Sorting:
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆27Updated 5 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 2 years ago
- NT AUTHORITY\SYSTEM☆39Updated 4 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆71Updated 3 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated last year
- ☆38Updated 2 months ago
- 2022 Updated Kernelmode-Code☆31Updated last year
- 💻 Windows 10 Kernel-mode rootkit☆31Updated 2 years ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆16Updated 2 years ago
- ☆16Updated 3 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆36Updated last year
- C++ Multi-Stage Semi-Polymorphic Malware Loader.☆9Updated 3 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆25Updated 5 years ago
- Abusing exceptions for code execution.☆111Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆72Updated last year
- Simple API Hooks detector☆73Updated 2 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆19Updated 2 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆11Updated 3 years ago
- Basic disassembly technique to slow down disasm process☆10Updated 5 years ago
- ☆13Updated 4 years ago
- Rite Of Passage ROP Injector☆34Updated 5 years ago
- PoC of a UEFI Petya ransomware☆42Updated 2 years ago
- ☆73Updated last year
- simple user-mode Rootkit☆104Updated 2 years ago
- ☆28Updated 2 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆43Updated 8 months ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆70Updated 3 years ago
- Native Powers Talk demos☆14Updated last year