Cybersecurity research results. Simple C/C++ and Python implementations
-
Updated
Jun 1, 2024 - C
Cybersecurity research results. Simple C/C++ and Python implementations
The PE file analysis toolkit
Transparently call NTAPI via Halo's Gate with indirect syscalls.
A project for building Linux && IoT Malware for fun and profit
An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in general (sandboxing).
Hellokitty Ransomware Sourcecode leaked
Following guides to learn the basics of building malware in C, for educational purposes.
A Linux/Windows Ransomware PoC written in Python, Go and C
A dedicated repository for exploring offensive kernel-mode techniques.
An Nginx module for persistent privileged malware
C&C Mechanism for Basic Botnet
Dash rootkit. Linux Trojan Backdoor. (MALWARE)
Malicious 'C' Code that cripples an iPhone and renders it unusable while executed with a configuration profile.
Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blog post
-x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.
64-bit LKM Rootkit builder based on yaml prescription. Working on 5.15.5 kernel
64-bit PIE Binary Injector
Research code & papers from members of vx-underground.
Dynamic Decryption Procedures
Add a description, image, and links to the malware-research topic page so that developers can more easily learn about it.
To associate your repository with the malware-research topic, visit your repo's landing page and select "manage topics."