sukritisingh / Anti-Reversing-Techniques
Understanding some of the Anti-Reversing Techniques
☆12Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for Anti-Reversing-Techniques
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆25Updated 5 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆9Updated last year
- C++ Multi-Stage Semi-Polymorphic Malware Loader.☆8Updated 3 years ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆16Updated last year
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆69Updated 3 years ago
- 💻 Windows 10 Kernel-mode rootkit☆31Updated 2 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆32Updated last year
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆25Updated 3 months ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆69Updated last year
- Rust program for interfacing with the gigabyte driver to gain access to powerful primitives such as arbitrary kernel memcpy.☆17Updated last year
- Compile shellcode into an exe file from Windows or Linux.☆58Updated 3 years ago
- Hooking Heavens Gate in a weekend☆13Updated 2 years ago
- ☆28Updated 2 years ago
- PoC of a UEFI Petya ransomware☆38Updated last year
- Basic disassembly technique to slow down disasm process☆10Updated 5 years ago
- Native Powers Talk demos☆14Updated last year
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 2 years ago
- A C++17 framework designed to enable obfuscation of constants, variables, and strings.☆26Updated last year
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- Here are some of my malware reversing papers that I will be publishing☆31Updated 2 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- ☆15Updated 3 years ago
- ☆24Updated 7 months ago
- A journal for $6,000 Riot Vanguard bounty.☆57Updated last year
- Offensive Assembly code snippets.☆10Updated last year
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 2 years ago