x86byte / Stuxnet-RootkitLinks
Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis
☆56Updated 8 months ago
Alternatives and similar repositories for Stuxnet-Rootkit
Users that are interested in Stuxnet-Rootkit are comparing it to the libraries listed below
Sorting:
- ☆58Updated 3 months ago
- Repo for all my exploits/PoCs☆51Updated 3 weeks ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆81Updated last week
- Situational Awareness script to identify how and where to run implants☆50Updated 5 months ago
- ☆72Updated last year
- Lena's scripts/code/resources for malware analysis☆27Updated 11 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 2 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆82Updated 3 months ago
- Make an Linux Kernel rootkit visible again.☆52Updated 3 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- POC of GITHUB simple C2 in rust☆53Updated 4 months ago
- ☆56Updated 6 months ago
- ☆59Updated 8 months ago
- PowerShell script to generate ShellCode in various formats☆42Updated 8 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Windows Administrator level Implant.☆49Updated 8 months ago
- vulnlab.com reaper writeup☆26Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 9 months ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆111Updated 10 months ago
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- Create Anti-Copy DRM Malware☆57Updated 9 months ago
- ☆59Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆70Updated last year
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆113Updated 4 months ago
- Stage 0☆160Updated 5 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- ☆85Updated 2 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆147Updated last year
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆103Updated 2 months ago