Hidden VNC constitutes an ingenious stratagem harnessed by the most adept connoisseurs of technology. This method, by far, presents an exhilarating modality to govern the operation
-
Updated
Oct 4, 2024 - C
Malware can take various forms, including viruses, worms, Trojans, ransomware, spyware, and more. Its primary goal is to compromise the integrity, confidentiality, or availability of information, often for financial gain, espionage, or other malicious purposes.
Hidden VNC constitutes an ingenious stratagem harnessed by the most adept connoisseurs of technology. This method, by far, presents an exhilarating modality to govern the operation
A C-based stealer malware developed in 2024 for educational and research purposes.⭐
Cybersecurity research results. Simple C/C++ and Python implementations
This repo compiles commonly used malware TTPs for educational purposes.
Sanctum is a proof-of-concept EDR like tool, designed to detect modern malware techniques, above and beyond the capabilities of antivirus.
SSN parser/extractor for AV/EDR evasion
Encrypted self-injection malware that creates a shell on a victim's pc, using Xor and Base64 encryption.
Repository for malware development, analysis and prevention. For research and educational purposes only.
This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as part of the Malware Resurrection technique.
Source code examples for a deprecated "DLL Memory Mapped Path Inclusion framework."
Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis
C2 : Command and Control Server for the Trojan Backdoor, acting as Remote access tool. Trojan Execution
Anva allows the monitoring of userland programs through running it within the same virtual address space.
Decompile, optimize, recompile, and integrate spyware and remote control features into APK and EXE files with LurkerX, the ultimate tool for security researchers, penetration testers, and ethical hackers.
the bear is an infostealer (grabber) malware written in C and assembly with the focus on evading detection.