wbenny / mini-torLinks
proof-of-concept implementation of tor protocol using Microsoft CNG/CryptoAPI
☆407Updated 6 years ago
Alternatives and similar repositories for mini-tor
Users that are interested in mini-tor are comparing it to the libraries listed below
Sorting:
- Demos of various injection techniques found in malware☆795Updated 3 years ago
- Brand New Code Injection for Windows☆739Updated 5 years ago
- A set of tutorials about code injection for Windows.☆312Updated last year
- ☆519Updated 7 years ago
- metame is a metamorphic code engine for arbitrary executables☆599Updated 6 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆382Updated 8 years ago
- peinjector - MITM PE file infector☆609Updated 9 years ago
- This is a **WIP** tool that performs shellcode obfuscation in x86 instruction set.☆247Updated 9 years ago
- dll injection tool that implements various methods☆500Updated 12 years ago
- https://twitter.com/itsreallynick/status/1120410950430089224☆418Updated 6 years ago
- Mirror of users section of rootkit.com☆300Updated 9 years ago
- A tool to detect and crash Cuckoo Sandbox☆295Updated last year
- C++ application that uses memory and code hooks to detect packers☆273Updated 7 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆502Updated 8 years ago
- ZeroAccess v3 toolkit☆166Updated 8 years ago
- First open source and publicly available System Management Mode backdoor for UEFI based platforms. Good as general purpose playground for…☆627Updated 2 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆329Updated 3 years ago
- HORSEPILL rootkit PoC☆230Updated 9 years ago
- InfectPE - Inject custom code into PE file [This project is not maintained anymore]☆327Updated 8 years ago
- Simple runtime crypter in C/C++.☆166Updated 10 years ago
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆999Updated 6 years ago
- Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools☆462Updated 7 years ago
- Various snippets created during malware analysis☆461Updated 2 months ago
- ☆406Updated 8 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆160Updated 9 years ago
- A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.☆407Updated 11 years ago
- A memory scanning evasion technique☆895Updated 8 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆806Updated last year
- windows syscall table from xp ~ 10 rs4☆355Updated 7 years ago
- Portable Executable parsing library (from PE-bear)☆658Updated 2 months ago