⚠️ Malware Development training ⚠️
☆41Feb 24, 2025Updated last year
Alternatives and similar repositories for maldev
Users that are interested in maldev are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆39May 20, 2024Updated last year
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- High performance, distributed port scanner for mostly bugbounty. Fast by FastAPI.☆20May 2, 2024Updated 2 years ago
- Reports of cyber threat intelligence☆13Feb 15, 2023Updated 3 years ago
- maldev obviously☆28May 5, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 4 years ago
- Decrypt Chromium based browser passwords with PowerShell.☆136Mar 31, 2026Updated last month
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- my reading list for reverse engineering malware & exploit development☆16Feb 3, 2026Updated 3 months ago
- ☆10Jul 8, 2024Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆134Apr 18, 2026Updated 2 weeks ago
- Scan extracted file from Zeek with Yara rules and get statistical analysis for matching files. Optionally, simulate matching malicious fi…☆15Dec 18, 2023Updated 2 years ago
- ☆15Feb 12, 2023Updated 3 years ago
- API Hammering with C++20☆52Jul 21, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆15Dec 12, 2023Updated 2 years ago
- ☆45Apr 27, 2024Updated 2 years ago
- A small wifi penetration testing tool-kit☆12Jul 21, 2023Updated 2 years ago
- Extract LPD/LPR print job(s) from wireshark capture file☆12May 2, 2023Updated 3 years ago
- Pentester's toolbox☆12Updated this week
- ☆13May 14, 2022Updated 3 years ago
- Simple little rootkit made in C☆14Feb 15, 2021Updated 5 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- One-header configurable C++20 COFF loader☆20Jul 21, 2025Updated 9 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- A fully syscalled C/C++ userland anti-debugging library and CLI for Windows, designed to protect software from reverse engineering with a…☆94Apr 25, 2026Updated last week
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 7 months ago
- Shellcode execution via x86 inline assembly based on MSVC syntax☆17Apr 26, 2023Updated 3 years ago
- ☆10Mar 27, 2022Updated 4 years ago
- Red Team Operator: Malware Development Essentials Course☆101Jun 18, 2020Updated 5 years ago
- FastVulnVerify is an advanced Python tool developed to quickly identify common vulnerabilities encountered during penetration testing and…☆37Sep 16, 2024Updated last year
- C++ Code to perform a MiniDump of lsass.exe☆36Aug 2, 2023Updated 2 years ago
- Now You See Me, Now You Don't☆1,048Jan 23, 2026Updated 3 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Jul 5, 2022Updated 3 years ago
- ☆15Apr 20, 2022Updated 4 years ago
- ☆14Dec 24, 2023Updated 2 years ago
- ☆78Apr 25, 2023Updated 3 years ago
- The tool was created to assist with fuzzing and exploiting stack-based buffer overflows☆10Dec 29, 2020Updated 5 years ago
- A Dockerized build pipeline for custom Windows x64 shellcode☆54Dec 12, 2025Updated 4 months ago