Trigram database written in C++, suited for malware indexing
-
Updated
Oct 1, 2024 - C++
Malware can take various forms, including viruses, worms, Trojans, ransomware, spyware, and more. Its primary goal is to compromise the integrity, confidentiality, or availability of information, often for financial gain, espionage, or other malicious purposes.
Trigram database written in C++, suited for malware indexing
Self Injection Malware, currently UNDETECTED by windows defender, it creates a reverse shell on a target machine
This is a malware that abuses the GPU by using it in accelerating the decryption process
42 project - Prototype of a ransomware, without the ransom
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
I'm recreating the Labs from the Practical Malware Analysis Book (PMA). The source code in this repository is based on my Reverse Engineering skills.
A dynamic HTTP/s Payload Stager that automates updating decryption variables, saving time and effort in managing shellcode loaders.
A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal console builder.
Will you ever be able to use your PC again? It's a mystery. WARNING: This software is malware. Execute at your own risk.
NTAPI Anti-Debugging Checker and Patcher is a Windows-based tool designed for educational purposes, demonstrating how to detect and manipulate anti-debugging techniques in running processes using NTAPI functions. The tool allows users to retrieve and modify specific PEB (Process Environment Block) values, particularly the BeingDebugged flag.
Process Hollowing PoC to make gameplay enhancers undetected
Simple Windows shellcode executor
this project demonstrates shellcode injection on windows using self-injection and process injection.