x86byte / Stuxnet-RootkitLinks
Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis
☆75Updated last year
Alternatives and similar repositories for Stuxnet-Rootkit
Users that are interested in Stuxnet-Rootkit are comparing it to the libraries listed below
Sorting:
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 8 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 8 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆111Updated 5 months ago
- Make an Linux Kernel rootkit visible again.☆59Updated 8 months ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆43Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- ☆164Updated 8 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆43Updated 6 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆108Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆85Updated 2 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆101Updated 7 months ago
- ☆86Updated last year
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆183Updated last year
- ☆34Updated last year
- PoC that downloads an executable from a public SSL certificate☆131Updated 3 months ago
- Convert your shellcode into an ASCII string☆124Updated 4 months ago
- Backdooring VSCode Projects☆80Updated 5 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆140Updated 9 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated 2 years ago
- Situational Awareness script to identify how and where to run implants☆67Updated 11 months ago
- ☆59Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated 2 years ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆294Updated last week
- POC of GITHUB simple C2 in rust☆52Updated 3 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆183Updated last month
- Windows Administrator level Implant.☆49Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆71Updated last year
- ☆158Updated 5 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year