Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/0xvpr/malicious-software-research
A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.
https://github.com/0xvpr/malicious-software-research
c2 evasion injection keylogger living-off-the-land obfuscation ransomware research server shellcode socket
Last synced: 7 days ago
JSON representation
A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.
- Host: GitHub
- URL: https://github.com/0xvpr/malicious-software-research
- Owner: 0xvpr
- License: mit
- Created: 2021-08-15T03:10:50.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2024-04-01T16:04:00.000Z (8 months ago)
- Last Synced: 2024-04-02T11:02:00.888Z (8 months ago)
- Topics: c2, evasion, injection, keylogger, living-off-the-land, obfuscation, ransomware, research, server, shellcode, socket
- Language: C
- Homepage:
- Size: 743 KB
- Stars: 24
- Watchers: 1
- Forks: 5
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Malicious Software Research
This is a repository dedicated to researching, documenting, developing,
and ultimately, **defending** against various strains of malicious software.## Environment (Requires Docker)
```bash
git clone https://github.com/0xvpr/Malicious-Software-Research
cd Malicious-Software-Research
chmod +x build-image.sh run-image.sh
./build-image.sh
./run-image.sh
```## Navigation
[Code Examples](#code-examples)
01. [Storage Techniques](#storage-techniques)
02. [Injection Techniques](#injection-techniques)
03. [Obfuscation Techniques](#obfuscation-techniques)
04. [Evasion](#evasion)
05. [Ransomware](#ransomware)
06. [Living Off The Land](#living-off-the-land)
07. [Socket](#socket)
08. [Keyloggers](#keyloggers)
09. [Droppers](#droppers)
10. [Hooking Techniques](#hooking-techniques)[Learning Resources](#learning-resources)
### **Code Examples**
01. Storage Techniques
- Data
- Text
- Rsc
02. Injection Techniques
- Crt
03. Obfuscation Techniques
- Aes
- Xor
- Simple Template Metaprogramming
- Intermediate Template Metaprogramming
04. Evasion
- Anti Dynamic Analysis Techniques
05. Ransomware
- Simple Recursive Encryptor
06. Living Off The Land
07. Socket
- Linux Server
- Python C2 Server
08. Keyloggers
- Simple Keylogger
09. Droppers
- Simple Dropper
- Intermediate Dropper
10. Hooking Techniques
- Absolute Jmp Detour
- Absolute Jmp Detour Once
- Relative Jmp Detour### **Learning Resources**
- Reversing C++ Classes and Structures
- Paul Vincent Sabanal & Mark Vincent Yason
- Reflective DLL Injection
- MSF Explanation
- Executing Position Independent Shellcode from Object Files in Memory
- Dark VortEx
- Shellcode Crafting
- fb1h2s
- Getting Familiar with Sockets
- ActiveXSploit
- Anti Dynamic Analysis & Sandboxes
- 0xPat
- Anti Debugging
- 0xPat
- Anti Static Analysis Tricks
- 0xPat