Hidden kernel mode code execution for bypassing modern anti-rootkits.
-
Updated
Dec 23, 2010 - C++
Malware can take various forms, including viruses, worms, Trojans, ransomware, spyware, and more. Its primary goal is to compromise the integrity, confidentiality, or availability of information, often for financial gain, espionage, or other malicious purposes.
Hidden kernel mode code execution for bypassing modern anti-rootkits.
Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.
Simple tool for unpacking packed/protected malware executables.
Easily add an NSA backdoor into your Rails app.
Send files for analysis in Cuckoo Sandbox from context menu
Kaggle "Microsoft Malware Classification Challenge". 6th place solution
Public open-source code of malware NetTraveler (aka TravNet).
Some anti QEMU trick used by in-the-wild malware.
This library perform automatic yara rule generation by using bloom filter for whitelisting.
ENSuRE Project: Machine Learning and Malware Classification
A open source Python script to perform static analysis on a Malware Binary File (portable executable).
A collection of known Domain Generation Algorithms