vxunderground / VXUG-Papers
Research code & papers from members of vx-underground.
☆1,174Updated 3 years ago
Alternatives and similar repositories for VXUG-Papers:
Users that are interested in VXUG-Papers are comparing it to the libraries listed below
- Collection of various malicious functionality to aid in malware development☆1,554Updated 10 months ago
- Nidhogg is an all-in-one simple to use windows kernel rootkit.☆1,863Updated 3 months ago
- Resources for Windows exploit development☆1,552Updated 3 years ago
- Malware samples, analysis exercises and other interesting resources.☆1,498Updated last year
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,085Updated 2 weeks ago
- Some of my publicly available Malware analysis and Reverse engineering.☆773Updated 7 months ago
- A workshop about Malware Development☆1,608Updated last year
- Organized list of my malware development resources☆1,469Updated 2 years ago
- AV/EDR evasion via direct system calls.☆1,831Updated 2 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,067Updated 3 years ago
- ☆2,036Updated last year
- A tool to kill antimalware protected processes☆1,405Updated 3 years ago
- Identifies the bytes that Microsoft Defender flags on.☆2,371Updated last year
- A not so awesome list of malware gems for aspiring malware analysts☆800Updated last year
- This program is designed to demonstrate various process injection techniques☆1,094Updated last year
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,183Updated last month
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆689Updated 4 years ago
- ☆1,019Updated 7 months ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆1,113Updated last year
- This is a repository of resource about Malware techniques☆777Updated last year
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆729Updated 3 years ago
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆720Updated 10 months ago
- Materials for Windows Malware Analysis training (volume 1)☆1,957Updated 6 months ago
- A modern 64-bit position independent implant template☆1,093Updated 7 months ago
- Great explanation of Process Hollowing (a Technique often used in Malware)☆1,280Updated last year
- Open-Source Shellcode & PE Packer☆1,874Updated 11 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,167Updated last year
- AV/EDR evasion via direct system calls.☆1,576Updated 2 years ago
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆870Updated 2 years ago