sukritisingh / Anti-Reversing-Techniques
Understanding some of the Anti-Reversing Techniques
☆12Updated 5 years ago
Alternatives and similar repositories for Anti-Reversing-Techniques:
Users that are interested in Anti-Reversing-Techniques are comparing it to the libraries listed below
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆26Updated 5 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆72Updated 3 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆9Updated last year
- 💻 Windows 10 Kernel-mode rootkit☆31Updated 2 years ago
- Detect API Hooks☆73Updated 2 years ago
- PoC of a UEFI Petya ransomware☆41Updated 2 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆69Updated 2 years ago
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆36Updated 3 years ago
- Recreating and reviewing the Windows persistence methods☆37Updated 3 years ago
- ☆28Updated 2 years ago
- NT AUTHORITY\SYSTEM☆39Updated 4 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 3 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆74Updated 3 years ago
- XssBot-Модульный резидентный бот с супер админкой☆12Updated 2 years ago
- Metamorphic Code Generator & Loader☆14Updated 4 years ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆16Updated last year
- x86 Trampoline Hook☆40Updated 2 years ago
- 2022 Updated Kernelmode-Code☆31Updated last year
- Bypass Malware Time Delays☆100Updated 2 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆41Updated 6 months ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆15Updated 3 years ago
- code obfuscation via control flow flattening☆13Updated 7 years ago
- C++ Multi-Stage Semi-Polymorphic Malware Loader.☆9Updated 3 years ago
- ☆16Updated 3 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 2 years ago
- ☆107Updated 2 years ago
- Piece of code to detect and remove hooks in IAT☆63Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- Polymorphic ELF Runtime Crypter written in rust.☆21Updated 4 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆70Updated last year