Research code & papers from members of vx-underground.
- Updated
Dec 7, 2021 - C
Research code & papers from members of vx-underground.
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
Leaked Linux.Mirai Source Code for Research/IoC Development Purposes
AV bypass while you sip your Chai!
Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks
Extensible Position Independent Code – shellcode (C/C++) development and building toolkit designed for developer experience, predictability, and modularity.
My projects to understand malware development and detection. Use responsibly. I'm not responsible if you cause unauthorised damage to anyone's system.
LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis
Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis
A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).
Windows UEFI Bootkit
From C to binary shellcode converter.
-x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.
Windows Kernel Rootkit
Python based tool for generating Shellcode from PIC C
takes shellcode with bad-characters and banishes them, returning cleaned shellcode with preserved functionalities
Add a description, image, and links to the malware-development topic page so that developers can more easily learn about it.
To associate your repository with the malware-development topic, visit your repo's landing page and select "manage topics."