Creation of multiple Malware tools consisting of evasion, enumeration and exploitation
☆101May 4, 2026Updated this week
Alternatives and similar repositories for MalDev
Users that are interested in MalDev are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerShell implementation for AD CS☆143Mar 2, 2026Updated 2 months ago
- demo unhooking functions in ntdll☆28Jul 15, 2025Updated 9 months ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆13May 7, 2025Updated 11 months ago
- A Bloodhound alternative. BloodBash will ingest the same files bloodhound does but no server is required to use this tool. It's great for…☆198Mar 2, 2026Updated 2 months ago
- Learn how to intercept flutter apps☆25Jan 19, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals☆61Nov 24, 2025Updated 5 months ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- Monitor your study sessions, log your study hours, set goals, and watch your productivity progress.☆10May 19, 2024Updated last year
- Blocking Windows EDR agents by registering an own IPC-object in the Object Manager’s namespace (CVE-2023-3280, CVE-2024-5909, CVE-2024-20…☆36Feb 27, 2025Updated last year
- rust wrappers for kernel mode synchronization primitives☆16Feb 14, 2026Updated 2 months ago
- Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.☆19Mar 31, 2026Updated last month
- A terminal workspace with batteries included☆19Sep 21, 2025Updated 7 months ago
- A list of all Active Directory machines from HackTheBox☆252Apr 26, 2026Updated last week
- Token impersonation in PowerShell to execute under the context of another user.☆25Oct 14, 2025Updated 6 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.☆18Jan 4, 2026Updated 4 months ago
- This is a compiled cheatsheet from my experience of OSCP 2023 journey. Won't say it is all-rounded but a good starting point if you wanna…☆14Oct 17, 2024Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Nov 29, 2023Updated 2 years ago
- ☆17Dec 18, 2022Updated 3 years ago
- Python Exploitation Framework☆43Apr 28, 2026Updated last week
- OSEP - Offsec Expert Professional☆21Jun 23, 2024Updated last year
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆129Feb 17, 2026Updated 2 months ago
- Recently, the OpenSSH maintainers released security updates to fix a critical vulnerability that could lead to unauthenticated remote cod…☆13Jul 2, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Hours of research on color theory and what hues stimulate the eyes, and hand-picked hacked icons☆14Mar 13, 2024Updated 2 years ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆30Feb 15, 2026Updated 2 months ago
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Sep 1, 2025Updated 8 months ago
- SLAM - Simple Local Area Monitor is a lightweight tool for continuous local network monitoring and device discovery.☆18Jul 9, 2025Updated 9 months ago
- Rdio Scanner is an open source software that ingest and distribute audio files generated by various software-defined radio recorders. Its…☆33Apr 6, 2022Updated 4 years ago
- Lightweight, customizable enumeration script to aid in time-saving when participating in hacking labs or OSCP exam.☆32Feb 18, 2026Updated 2 months ago
- ☆23Mar 14, 2025Updated last year
- Repository for tools used for the OSCP☆26Sep 18, 2025Updated 7 months ago
- Pentest report framework without data send☆19Sep 23, 2025Updated 7 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆80Apr 11, 2026Updated 3 weeks ago
- Built a mini HoneyNet in Azure and ingest log sources from various resources into a Log Analytics workspace☆24Jul 19, 2023Updated 2 years ago
- With zero dependencies, NetCredz extracts credentials from pcap files or live traffic, supporting NTLM, LDAP, HTTP, SMTP, SNMP, Telnet, F…☆79Dec 2, 2024Updated last year
- Shellcode injection using debugging APIs☆19Jan 13, 2014Updated 12 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- vectorized decimal parsing☆13Dec 17, 2022Updated 3 years ago
- n8n workflows related to bug bounty☆48Oct 27, 2025Updated 6 months ago