Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis
☆94Sep 14, 2024Updated last year
Alternatives and similar repositories for Stuxnet-Rootkit
Users that are interested in Stuxnet-Rootkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆30Oct 19, 2024Updated last year
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- Run shellcode via EnumDesktopsA. C++ implementation☆13Jun 27, 2022Updated 3 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 5 years ago
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆20Jul 16, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆119Feb 18, 2025Updated last year
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆22Jul 24, 2022Updated 3 years ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- ☆25Mar 23, 2026Updated last month
- Privilege Escalation using Passwd - April Fools prank☆37Apr 3, 2025Updated last year
- View in depth data of all Bluetooth devices around your Ubertooth device. Sends the data remotely to a Discord Webhook if desired so you …☆23Aug 3, 2024Updated last year
- 免杀木马样本☆106Oct 11, 2025Updated 6 months ago
- execute PE in memory Filelessly☆52Feb 8, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆42Sep 28, 2024Updated last year
- ☆143May 22, 2024Updated last year
- Analyse MSI files for vulnerabilities☆143Aug 30, 2024Updated last year
- Various notes I have compiled during the OSEP PEN-300 course.☆44Mar 16, 2025Updated last year
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆22Aug 2, 2025Updated 9 months ago
- ☆31Aug 23, 2020Updated 5 years ago
- Implementation of Indirect Syscall technique to pop a calc.exe☆112Jan 25, 2024Updated 2 years ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆41Sep 9, 2023Updated 2 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆24Apr 7, 2022Updated 4 years ago
- CHAOS RAT web panel path RCE PoC☆30Apr 15, 2024Updated 2 years ago
- DUQU MALWARE SOURCE + BINARY + More coming☆14Feb 6, 2023Updated 3 years ago
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆350Oct 7, 2024Updated last year
- ☆35Dec 6, 2023Updated 2 years ago
- A set of tools and resources for analysis of Havoc C2☆28Feb 27, 2024Updated 2 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆113Jan 12, 2024Updated 2 years ago
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- ☆61Oct 24, 2024Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 3 years ago
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆114Jan 26, 2026Updated 3 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆217Oct 19, 2024Updated last year
- ☆19Sep 17, 2025Updated 7 months ago