⚠️ Malware Development training ⚠️
☆40Feb 24, 2025Updated last year
Alternatives and similar repositories for maldev
Users that are interested in maldev are comparing it to the libraries listed below
Sorting:
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆39May 20, 2024Updated last year
- ☆14May 14, 2022Updated 3 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- ☆13Dec 24, 2023Updated 2 years ago
- Reports of cyber threat intelligence☆13Feb 15, 2023Updated 3 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- ☆22Jan 29, 2025Updated last year
- my reading list for reverse engineering malware & exploit development☆15Feb 3, 2026Updated last month
- Damn Vulnerable Rails app☆13Sep 20, 2012Updated 13 years ago
- ☆44Apr 27, 2024Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- High performance, distributed port scanner for mostly bugbounty. Fast by FastAPI.☆21May 2, 2024Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆128Feb 28, 2026Updated last week
- Nuclei scripts created by @rxerium for zero days / actively exploited vulnerabilities.☆77Feb 5, 2026Updated last month
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- maldev obviously☆28May 5, 2025Updated 10 months ago
- ☆34Jun 13, 2023Updated 2 years ago
- ☆65May 26, 2023Updated 2 years ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 4 months ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- ⚠️ malware development☆687May 27, 2024Updated last year
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- ☆78Apr 25, 2023Updated 2 years ago
- Now You See Me, Now You Don't☆1,025Jan 23, 2026Updated last month
- C++ Code to perform a MiniDump of lsass.exe☆36Aug 2, 2023Updated 2 years ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆42Apr 7, 2025Updated 10 months ago
- ☆29Jul 11, 2015Updated 10 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Jul 5, 2022Updated 3 years ago
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated 10 months ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- A small wifi penetration testing tool-kit☆11Jul 21, 2023Updated 2 years ago
- FastVulnVerify is an advanced Python tool developed to quickly identify common vulnerabilities encountered during penetration testing and…☆36Sep 16, 2024Updated last year
- C/C++ Windows Process Injector for Educational Purposes.☆10Apr 2, 2021Updated 4 years ago
- stmctf22☆35Nov 16, 2022Updated 3 years ago
- 🧞♂️ malware analysis☆38Mar 3, 2024Updated 2 years ago
- Distributed Multi-INT Fusion Center designed for decentralized situational awareness.☆47Updated this week
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago
- Windows internals and exploitation tricks☆112Nov 9, 2025Updated 3 months ago