
malware.asm
Reverse Engineering, Malware Development/Analysis
Highlights
- Pro
Pinned Loading
-
SSDT-Hooking
SSDT-Hooking PublicThe project uses SSDT Hooking to bypass security checks during driver loading by hooking NtLoadDriver and modifying the PreviousMode flag.
C 2
-
Malware-Resurrection
Malware-Resurrection PublicThis project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as part of the Malware Resurrection technique.
-
-
-
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.