Hidden kernel mode code execution for bypassing modern anti-rootkits.
-
Updated
Dec 23, 2010 - C++
Malware can take various forms, including viruses, worms, Trojans, ransomware, spyware, and more. Its primary goal is to compromise the integrity, confidentiality, or availability of information, often for financial gain, espionage, or other malicious purposes.
Hidden kernel mode code execution for bypassing modern anti-rootkits.
Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.
Simple tool for unpacking packed/protected malware executables.
Public open-source code of malware NetTraveler (aka TravNet).
Some anti QEMU trick used by in-the-wild malware.
InfectPE - Inject custom code into PE file [This project is not maintained anymore]
Vaccinating against WannaCry ransomware: a free tool by Minerva's research team
Source codes of malwares, stress tests etc. for computer.
🙀 Icon Changer, File Pumper & Extension Spoofer - Quickly Modify Executable Files
A C/C++ implementation of Microsoft's Antimalware Scan Interface