therealdreg / The-GTK-Keylogger
The GTK Keylogger
☆19Updated last year
Related projects ⓘ
Alternatives and complementary repositories for The-GTK-Keylogger
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆15Updated last year
- Enter Product Key Volatile Environment LPE☆11Updated 2 years ago
- Various Crypter Project☆51Updated 10 years ago
- Another Portable Executable files analysing stuff☆18Updated 13 years ago
- Process Hollowing techniques as used in many file Crypters (C/C++)☆82Updated 4 years ago
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆33Updated 10 years ago
- ☆21Updated 3 years ago
- [F]aster [U]niversal [U]npacker☆46Updated 11 years ago
- Hidden kernel mode code execution for bypassing modern anti-rootkits.☆80Updated 13 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago
- Source code of my KeygenMe V7 challenge☆22Updated 6 years ago
- A Simple AES Command Line Crypter☆35Updated last year
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆41Updated 6 years ago
- Archive of ransomware decryptors☆29Updated 6 years ago
- Ransomware Using CryptoAPI☆13Updated 6 years ago
- Project aimed at creating a malware able to evolve and adapt to the various host machines through metamorphic modifications, spontaneous …☆41Updated 7 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆51Updated 2 years ago
- A small utility to run raw code chunks in the executable memory area.☆14Updated 9 years ago
- Simple C++ ransomware, prove the concept.☆25Updated 7 years ago
- Sysprep Volatile Environment LPE (2017)☆13Updated 2 years ago
- Notes about reverse engineering the Petya2017 ransomware☆18Updated 7 years ago
- TaskMgr Volatile Environment LPE☆12Updated 2 years ago
- Decoders for 7ev3n ransomware☆14Updated 8 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Updated 4 years ago
- The Grum Spam Bot☆20Updated 9 years ago
- A small library helping to parse commandline parameters (for C/C++)☆53Updated last year
- DarkRats Standalone HVNC☆23Updated 2 years ago
- A DLL that performs IAT hooking☆26Updated 6 years ago