vivekgautham / A-Simple-Polymorphic-VirusLinks
A simple polymorphic virus that changes its signature whenever it replicates
☆12Updated 8 years ago
Alternatives and similar repositories for A-Simple-Polymorphic-Virus
Users that are interested in A-Simple-Polymorphic-Virus are comparing it to the libraries listed below
Sorting:
- Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used …☆154Updated 2 years ago
- Set of antianalysis techniques found in malware☆133Updated 2 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆74Updated 4 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆72Updated 7 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆74Updated 3 years ago
- A kernel rootkit with remote command and control interface for windows☆109Updated 8 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 6 years ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆192Updated 6 months ago
- A simple polymorphic engine☆44Updated 6 years ago
- PoC designed to evade userland-hooking anti-virus.☆90Updated 6 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆99Updated 4 years ago
- Cryline project - It's a simple test ransomware for Windows OS without stable encryption. Pls use this source code for study purposes on…☆57Updated 8 months ago
- Process Hollowing Detection on a live system☆13Updated 8 years ago
- I was challenged by a friend to list all the processes and drivers in a system using more "unusual" methods. By doing this I learned quit…☆14Updated 9 years ago
- Process Hollowing techniques as used in many file Crypters (C/C++)☆85Updated 5 years ago
- Inject code into a legitimate process☆146Updated 11 years ago
- Demos of various (also non standard) persistence methods used by malware☆224Updated 2 years ago
- ☆110Updated 6 years ago
- Windows Drivers☆100Updated 6 years ago
- ☆12Updated 4 years ago
- Packer (actually a crypter) for antivirus evasion implemented for windows PE files (BSc-Thesis)☆105Updated 5 years ago
- Polymorphic virus and anitvirus software for information security team project.☆20Updated 6 years ago
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆80Updated 3 years ago
- Process Hollowing for 32 bit and 64 bit☆79Updated 8 years ago
- Simple Packer PE File☆16Updated 6 years ago
- This repo basically contains the code that was mentioned in the blogposts that was written by me at:☆99Updated 3 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆178Updated last year
- Windows System Programming Experiments☆223Updated 3 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆58Updated 6 months ago
- https://blog.f-secure.com/hiding-malicious-code-with-module-stomping/☆126Updated 6 years ago