wbenny / mini-torLinks
proof-of-concept implementation of tor protocol using Microsoft CNG/CryptoAPI
☆406Updated 6 years ago
Alternatives and similar repositories for mini-tor
Users that are interested in mini-tor are comparing it to the libraries listed below
Sorting:
- A set of tutorials about code injection for Windows.☆314Updated last year
- peinjector - MITM PE file infector☆605Updated 9 years ago
- ☆517Updated 7 years ago
- Brand New Code Injection for Windows☆738Updated 4 years ago
- Demos of various injection techniques found in malware☆796Updated 3 years ago
- metame is a metamorphic code engine for arbitrary executables☆592Updated 5 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆379Updated 8 years ago
- Simple runtime crypter in C/C++.☆165Updated 9 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆497Updated 7 years ago
- dll injection tool that implements various methods☆498Updated 12 years ago
- A tool to detect and crash Cuckoo Sandbox☆295Updated last year
- Mirror of users section of rootkit.com☆298Updated 8 years ago
- HORSEPILL rootkit PoC☆229Updated 9 years ago
- ZeroAccess v3 toolkit☆165Updated 7 years ago
- This is a **WIP** tool that performs shellcode obfuscation in x86 instruction set.☆245Updated 9 years ago
- InfectPE - Inject custom code into PE file [This project is not maintained anymore]☆325Updated 8 years ago
- Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools☆458Updated 6 years ago
- A proof of concept injectable C++ dll, that uses naked inline hooking and direct memory modification to change your TeamViewer permissio…☆309Updated 7 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆328Updated 3 years ago
- C++ application that uses memory and code hooks to detect packers☆271Updated 7 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆159Updated 9 years ago
- ☆402Updated 8 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆465Updated last year
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆803Updated last year
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆741Updated 6 years ago
- https://twitter.com/itsreallynick/status/1120410950430089224☆414Updated 6 years ago
- Various snippets created during malware analysis☆458Updated 3 weeks ago
- A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.☆406Updated 10 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆183Updated 6 years ago
- A memory scanning evasion technique☆888Updated 8 years ago