x86byte / Stuxnet-RootkitLinks
Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis
☆85Updated last year
Alternatives and similar repositories for Stuxnet-Rootkit
Users that are interested in Stuxnet-Rootkit are comparing it to the libraries listed below
Sorting:
- Make an Linux Kernel rootkit visible again.☆59Updated 11 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Updated 11 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆124Updated last month
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- ☆58Updated 7 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆113Updated 2 years ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 6 years ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆44Updated 9 months ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Updated 2 years ago
- ☆96Updated last year
- Backdooring VSCode Projects☆124Updated 8 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆68Updated 2 months ago
- ☆164Updated 11 months ago
- ☆59Updated last year
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆61Updated last year
- ☆86Updated 3 years ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆75Updated last year
- ☆72Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆106Updated 2 months ago
- Enumerate active EDR's on the system☆150Updated 4 months ago
- Repo for all my exploits/PoCs☆51Updated 9 months ago
- Situational Awareness script to identify how and where to run implants☆67Updated last year
- Analyse MSI files for vulnerabilities☆141Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 11 months ago
- ☆44Updated last year
- A collection of PoCs for different injection techniques on Windows!☆49Updated 2 years ago
- Windows Administrator level Implant.☆50Updated last year
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆142Updated last year
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆182Updated this week