This GitHub repository contains benign specimens; however, the techniques demonstrated herein could potentially be exploited for malicious purposes. Exercise discretion and responsibility in their usage. I disclaim any liability for actions resulting from your utilization of this content.
☆19Aug 4, 2024Updated last year
Alternatives and similar repositories for Malware_Specimens
Users that are interested in Malware_Specimens are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Metamorphic Permutating High-Obfuscating Reassembler. Coded by The Mental Driller/29A.☆27Aug 20, 2013Updated 12 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆32May 30, 2024Updated last year
- Various methods of executing shellcode☆74Mar 27, 2023Updated 3 years ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆16Apr 13, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- 本项目集成了全网优秀的攻防工具项目,包含自动化利用,子域名、敏感目录、端口等扫描,各大中间件,cms漏洞利用工具以及应急响应等资料。☆14Jul 18, 2022Updated 3 years ago
- C++ Reflective Assembly Loader☆32Mar 7, 2025Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆103Jun 16, 2024Updated last year
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- A python metamorphic engine for PE/PE+ files.☆15Jan 1, 2023Updated 3 years ago
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 10 months ago
- ☆19Dec 1, 2024Updated last year
- RunPE implementation with multiple evasive techniques (2)☆280Sep 25, 2025Updated 6 months ago
- DSE & PG bypass via BYOVD attack☆78Jul 12, 2025Updated 9 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Umbrella will protect your shellcode from the rain.☆30Jun 4, 2025Updated 10 months ago
- Two tools written in C that block network traffic for blacklisted EDR processes, using either Windows Defender Firewall (WDF) or Windows …☆265Sep 23, 2025Updated 6 months ago
- RTSPServer Code Execution Vulnerability CVE-2018-4013☆15Nov 26, 2018Updated 7 years ago
- ☆66Dec 19, 2024Updated last year
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- posting example☆15May 11, 2020Updated 5 years ago
- GhostWriting Injection Technique.☆196Mar 26, 2018Updated 8 years ago
- Use NAT to reroute an applications UDP traffic for MITM purposes.☆11Sep 30, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆14Dec 24, 2019Updated 6 years ago
- A C++/Asm template for PIC/EXE/DLL malware☆24Aug 12, 2025Updated 8 months ago
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆21Mar 23, 2026Updated 3 weeks ago
- slides for talk given during uscg 2023 combine☆36Sep 6, 2023Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆17Aug 14, 2023Updated 2 years ago
- This tool exploits Golden DMSA attack against delegated Managed Service Accounts.☆93Jul 15, 2025Updated 9 months ago
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆36Feb 4, 2026Updated 2 months ago
- 记录学习codeql的过程☆10Jan 27, 2022Updated 4 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆31Oct 28, 2019Updated 6 years ago
- ICMP隧道,用于内网渗透工具☆10Mar 13, 2019Updated 7 years ago
- ☆24Mar 20, 2025Updated last year
- A Windows PE packer for executables (x64) with LZMA compression and with full TLS (Thread Local Storage) support.☆96Oct 27, 2025Updated 5 months ago
- Use this to Download jio saavn songs without wastin goddamn money☆10Aug 31, 2020Updated 5 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆75Sep 29, 2022Updated 3 years ago