yorickdewid / Sasser
Sasser worm
☆19Updated 9 years ago
Alternatives and similar repositories for Sasser:
Users that are interested in Sasser are comparing it to the libraries listed below
- 64 bit monolithic nt-style kernel☆96Updated 3 years ago
- a "process-less" trojan☆12Updated 4 years ago
- It's my First GDI Virus with MBR Overwriting... Enjoy :D☆11Updated 2 years ago
- ☆18Updated 6 years ago
- ☆14Updated 8 years ago
- A basic PE bootloader☆13Updated last year
- Simple algorithm to brute force CRC32 hashes☆16Updated 8 years ago
- MyDoom source☆62Updated 9 years ago
- Collection of various types of win32 malware & tools etc.☆23Updated 2 years ago
- Koteyka 2 repository.☆39Updated 5 years ago
- A simple program that uses an overlapping window to create a melting screen effect.☆41Updated 8 years ago
- Code that overwrites the Windows MBR with a custom bootloader!☆57Updated 2 years ago
- Xytharis - the GDI Trojan☆15Updated 2 years ago
- A little Trojan I wrote in a few days, creating GDI screen effects.☆69Updated 3 years ago
- A simple program to scan for open handles in a process.☆62Updated 8 years ago
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆75Updated 8 months ago
- A Simple dynamic library to demonstrate IAT API hooking on Windows NT.☆86Updated 8 years ago
- Windows NT 4.0 source code leak☆87Updated 4 years ago
- A full rewrite of Red Petya ransomware from 2016 with full MBR and GPT support☆19Updated 2 years ago
- Read Readme.md☆23Updated 3 years ago
- A demo tutorial for low-level and kernel developers - developing a custom Windows boot loader☆69Updated 4 years ago
- Custom LoadLibrary implementation☆57Updated 9 years ago
- ☆9Updated 8 years ago
- MBR virus☆21Updated 3 years ago
- The Windows Research Kernel v1.2 contains the sources for the core of the Windows (NTOS) kernel and a build environment for a kernel that…☆79Updated 6 years ago
- More and less dangerous viruses. Use at Your own risk.☆48Updated last year
- A fork of the MEMZ malware from Leurak☆1Updated 4 years ago
- Application that demonstrates how to manually cause bluescreen using undocumented Windows Native API☆40Updated 8 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆21Updated 3 years ago
- Process Hollowing techniques as used in many file Crypters (C/C++)☆82Updated 4 years ago