malware source code
search
⌘Ctrlk
malware source code
  • message-smileIntroduction
  • Code base
    • file-circle-exclamationHeaders
    • pageCRT Recreation
  • pageString Hashing
  • pageAntidebugging Methods
  • pageLibrary Loading
  • pageError Handling
  • pageFingerprinting
  • pageWrappers and Helpers
  • pageProcess Creation Techniques
  • pageShellcode Execution
  • pageCompression
  • pageNetworking
  • pageLsass Related
  • pageProxied Functions
  • pageEvasion
  • pageComponent Object Model
  • My Projects
    • Proof-of-Concepts
      • "Jeff", COM-only keylogger
      • "Russian Doll", Recursive file loader
      • "Branchy", Branchless keylogger
      • "Fever Dream" - Code executing when the Windows machine is locked
      • Creating "Ransomware" Using WinRT
      • Getting Clipboard History in C++
      • Hiding data in GPU VRAM using Direct3D 11
      • OCRMe, dumping OneDrive Business OCR Data
      • Meow Meow Kitty Cat Meow Meow
        • MMKCMM Insert
        • MMKCMM Pspsps
        • MMKCMM Loader
          • Syscall Trampoline
          • MMKCMM Loader
      • No Need COM WMI
      • Disabling Bitlocker Encryption using undocumented COM objects
      • Stupid callbacks for malware evasion
      • Microsoft Copilot, Copilot my payload
      • HTTPS TLS with AFD.sys, WinSocks not necessary
    • Write-ups
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. My Projectschevron-right
  2. Proof-of-Conceptschevron-right
  3. Meow Meow Kitty Cat Meow Meow

MMKCMM Loader

Syscall Trampolinechevron-rightMMKCMM Loaderchevron-right
PreviousMMKCMM Pspspschevron-leftNextSyscall Trampolinechevron-right