Creation of multiple Malware tools consisting of evasion, enumeration and exploitation
☆98Mar 19, 2026Updated last week
Alternatives and similar repositories for MalDev
Users that are interested in MalDev are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- demo unhooking functions in ntdll☆28Jul 15, 2025Updated 8 months ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆12May 7, 2025Updated 10 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass ETW scanning by redirecting ETW calls to…☆45Jun 1, 2025Updated 9 months ago
- A Bloodhound alternative. BloodBash will ingest the same files bloodhound does but no server is required to use this tool. It's great for…☆179Mar 2, 2026Updated 3 weeks ago
- A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals☆60Nov 24, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Learn how to intercept flutter apps☆25Jan 19, 2024Updated 2 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- Monitor your study sessions, log your study hours, set goals, and watch your productivity progress.☆10May 19, 2024Updated last year
- PowerShell implementation for AD CS☆116Mar 2, 2026Updated 3 weeks ago
- Blocking Windows EDR agents by registering an own IPC-object in the Object Manager’s namespace (CVE-2023-3280, CVE-2024-5909, CVE-2024-20…☆36Feb 27, 2025Updated last year
- Lifetime AMSI bypass.☆36Apr 21, 2025Updated 11 months ago
- rust wrappers for kernel mode synchronization primitives☆16Feb 14, 2026Updated last month
- bootkit驱动映射,三环进程注入加载指定模块☆14Oct 8, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A terminal workspace with batteries included☆19Sep 21, 2025Updated 6 months ago
- A list of all Active Directory machines from HackTheBox☆221Mar 2, 2026Updated 3 weeks ago
- Python Exploitation Framework☆38Mar 9, 2026Updated 2 weeks ago
- Token impersonation in PowerShell to execute under the context of another user.☆24Oct 14, 2025Updated 5 months ago
- Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.☆14Jan 4, 2026Updated 2 months ago
- This is a compiled cheatsheet from my experience of OSCP 2023 journey. Won't say it is all-rounded but a good starting point if you wanna…☆14Oct 17, 2024Updated last year
- ☆17Dec 18, 2022Updated 3 years ago
- OSEP - Offsec Expert Professional☆21Jun 23, 2024Updated last year
- ☆21Mar 14, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- Recently, the OpenSSH maintainers released security updates to fix a critical vulnerability that could lead to unauthenticated remote cod…☆12Jul 2, 2024Updated last year
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆129Feb 17, 2026Updated last month
- Repository for tools used for the OSCP☆23Sep 18, 2025Updated 6 months ago
- Hours of research on color theory and what hues stimulate the eyes, and hand-picked hacked icons☆14Mar 13, 2024Updated 2 years ago
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Sep 1, 2025Updated 6 months ago
- Built a mini HoneyNet in Azure and ingest log sources from various resources into a Log Analytics workspace☆24Jul 19, 2023Updated 2 years ago
- SLAM - Simple Local Area Monitor is a lightweight tool for continuous local network monitoring and device discovery.☆18Jul 9, 2025Updated 8 months ago
- ☆19Sep 1, 2025Updated 6 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Lightweight, customizable enumeration script to aid in time-saving when participating in hacking labs or OSCP exam.☆31Feb 18, 2026Updated last month
- n8n workflows related to bug bounty☆47Oct 27, 2025Updated 5 months ago
- Python3 implementation of ADRecon with support for NTLM and Kerberos authentication querying LDAP. Generates individual CSV files and a s…☆59Feb 23, 2026Updated last month
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆63Mar 11, 2026Updated 2 weeks ago
- [Under Development] Basic Scripts included☆16Mar 29, 2025Updated 11 months ago
- ☆15Nov 18, 2020Updated 5 years ago
- Shellcode injection using debugging APIs☆19Jan 13, 2014Updated 12 years ago