Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis
☆91Sep 14, 2024Updated last year
Alternatives and similar repositories for Stuxnet-Rootkit
Users that are interested in Stuxnet-Rootkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆30Oct 19, 2024Updated last year
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 5 years ago
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆20Jul 16, 2024Updated last year
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆116Feb 18, 2025Updated last year
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆21Jul 24, 2022Updated 3 years ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- ☆26Mar 23, 2026Updated 3 weeks ago
- Privilege Escalation using Passwd - April Fools prank☆37Apr 3, 2025Updated last year
- View in depth data of all Bluetooth devices around your Ubertooth device. Sends the data remotely to a Discord Webhook if desired so you …☆23Aug 3, 2024Updated last year
- 免杀木马样本☆106Oct 11, 2025Updated 6 months ago
- ☆42Sep 28, 2024Updated last year
- ☆142May 22, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Analyse MSI files for vulnerabilities☆142Aug 30, 2024Updated last year
- Various notes I have compiled during the OSEP PEN-300 course.☆43Mar 16, 2025Updated last year
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆22Aug 2, 2025Updated 8 months ago
- ☆31Aug 23, 2020Updated 5 years ago
- Implementation of Indirect Syscall technique to pop a calc.exe☆112Jan 25, 2024Updated 2 years ago
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- ☆41Sep 9, 2023Updated 2 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 4 years ago
- CHAOS RAT web panel path RCE PoC☆30Apr 15, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- DUQU MALWARE SOURCE + BINARY + More coming☆14Feb 6, 2023Updated 3 years ago
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆347Oct 7, 2024Updated last year
- ☆35Dec 6, 2023Updated 2 years ago
- A set of tools and resources for analysis of Havoc C2☆28Feb 27, 2024Updated 2 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆111Jan 26, 2026Updated 2 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆112Jan 12, 2024Updated 2 years ago
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆60Oct 24, 2024Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 3 years ago
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆114Jan 26, 2026Updated 2 months ago
- ☆19Sep 17, 2025Updated 6 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆217Oct 19, 2024Updated last year
- Inject DLLs into the explorer process using icons☆407May 18, 2025Updated 10 months ago
- Embed a payload inside a PNG file☆373Oct 24, 2024Updated last year