0xbekoo / maldevView external linksLinks
⚠️ Malware Development training ⚠️
☆40Feb 24, 2025Updated 11 months ago
Alternatives and similar repositories for maldev
Users that are interested in maldev are comparing it to the libraries listed below
Sorting:
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆23Aug 21, 2023Updated 2 years ago
- ☆14May 14, 2022Updated 3 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆13Jun 2, 2024Updated last year
- Scan extracted file from Zeek with Yara rules and get statistical analysis for matching files. Optionally, simulate matching malicious fi…☆15Dec 18, 2023Updated 2 years ago
- ☆13Dec 24, 2023Updated 2 years ago
- ☆13Jun 14, 2024Updated last year
- Reports of cyber threat intelligence☆13Feb 15, 2023Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- ☆22Jan 29, 2025Updated last year
- my reading list for reverse engineering malware & exploit development☆15Feb 3, 2026Updated last week
- Damn Vulnerable Rails app☆13Sep 20, 2012Updated 13 years ago
- ☆44Apr 27, 2024Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- MALWARE-101==>> is a comprehensive guide to malware development. Covering basics to advanced techniques, we’ll explore malware types, bui…☆27Oct 15, 2025Updated 3 months ago
- Scanner for supply chain containing potential malware☆38Jan 17, 2026Updated 3 weeks ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆123Jan 1, 2026Updated last month
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆10Jan 4, 2025Updated last year
- maldev obviously☆28May 5, 2025Updated 9 months ago
- Nuclei scripts created by @rxerium for zero days / actively exploited vulnerabilities.☆76Feb 5, 2026Updated last week
- ☆65May 26, 2023Updated 2 years ago
- ⚠️ malware development☆681May 27, 2024Updated last year
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆22Oct 9, 2025Updated 4 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆38Apr 7, 2025Updated 10 months ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- ☆78Apr 25, 2023Updated 2 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Jul 5, 2022Updated 3 years ago
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated 10 months ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- Discord RAT made in powershell (open source)☆12Jul 16, 2025Updated 6 months ago
- ☆37Apr 1, 2024Updated last year
- stmctf22☆35Nov 16, 2022Updated 3 years ago
- 🧞♂️ malware analysis☆38Mar 3, 2024Updated last year
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Suffices of German town and village names☆10May 4, 2020Updated 5 years ago
- Automated pipeline for downloading, staging, ingesting, and investigating leaked and declassified archives (DDoSecrets, National Security…☆31Sep 22, 2025Updated 4 months ago
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago
- ⚖️ Freier Zugang zu unseren Gesetzen.☆14Jun 16, 2025Updated 7 months ago
- Zero-Day Code Injection and Persistence Technique☆35Mar 28, 2017Updated 8 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago