x86byte / Stuxnet-RootkitLinks
Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis
☆78Updated last year
Alternatives and similar repositories for Stuxnet-Rootkit
Users that are interested in Stuxnet-Rootkit are comparing it to the libraries listed below
Sorting:
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆118Updated 6 months ago
- Make an Linux Kernel rootkit visible again.☆59Updated 10 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆87Updated 10 months ago
- Backdooring VSCode Projects☆82Updated 6 months ago
- ☆164Updated 9 months ago
- POC of GITHUB simple C2 in rust☆52Updated 5 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Updated 2 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 9 months ago
- ☆59Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆76Updated 2 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆110Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆49Updated 11 months ago
- Convert your shellcode into an ASCII string☆125Updated 6 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆87Updated 3 weeks ago
- Analyse MSI files for vulnerabilities☆140Updated last year
- Situational Awareness script to identify how and where to run implants☆67Updated last year
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 6 years ago
- Repo for all my exploits/PoCs☆53Updated 7 months ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆115Updated 2 years ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 9 months ago
- PowerShell script to generate ShellCode in various formats☆46Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆73Updated last year
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆183Updated last year
- ☆91Updated last year
- ⚠️ Malware Development training ⚠️☆39Updated 10 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆142Updated 11 months ago
- ☆49Updated 6 months ago