⚠️ Malware Development training ⚠️
☆40Feb 24, 2025Updated last year
Alternatives and similar repositories for maldev
Users that are interested in maldev are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆39May 20, 2024Updated last year
- High performance, distributed port scanner for mostly bugbounty. Fast by FastAPI.☆21May 2, 2024Updated last year
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆23Aug 21, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Reports of cyber threat intelligence☆13Feb 15, 2023Updated 3 years ago
- maldev obviously☆28May 5, 2025Updated 10 months ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Decrypt Chromium based browser passwords with PowerShell.☆135Nov 14, 2025Updated 4 months ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- my reading list for reverse engineering malware & exploit development☆16Feb 3, 2026Updated last month
- ☆10Jul 8, 2024Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆129Mar 15, 2026Updated last week
- Damn Vulnerable Rails app☆13Sep 20, 2012Updated 13 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- API Hammering with C++20☆51Jul 21, 2022Updated 3 years ago
- SIGTRAN M3UA Protocol Stack☆11Feb 25, 2025Updated last year
- Dont Gamble with Risk☆14Mar 4, 2024Updated 2 years ago
- C/C++ antidebugging library for Windows☆57Nov 8, 2025Updated 4 months ago
- ☆15Feb 12, 2023Updated 3 years ago
- Pentester's toolbox☆12Jan 21, 2026Updated 2 months ago
- A small wifi penetration testing tool-kit☆11Jul 21, 2023Updated 2 years ago
- ☆15Dec 12, 2023Updated 2 years ago
- ☆45Apr 27, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Extract LPD/LPR print job(s) from wireshark capture file☆12May 2, 2023Updated 2 years ago
- ☆13May 14, 2022Updated 3 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 8 months ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆15Apr 21, 2025Updated 11 months ago
- Windows kernel driver for memory reading operations with userspace communication via IOCTL codes. Supports process memory access, PID res…☆14Jun 30, 2025Updated 8 months ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 6 months ago
- Shellcode execution via x86 inline assembly based on MSVC syntax☆17Apr 26, 2023Updated 2 years ago
- C++ Code to perform a MiniDump of lsass.exe☆36Aug 2, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- The tool was created to assist with fuzzing and exploiting stack-based buffer overflows☆10Dec 29, 2020Updated 5 years ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Jul 5, 2022Updated 3 years ago
- Unofficial Python client for Pinksale.☆11May 28, 2024Updated last year
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Aug 1, 2021Updated 4 years ago
- ☆14Dec 24, 2023Updated 2 years ago
- ☆78Apr 25, 2023Updated 2 years ago