D3Ext / maldev
Golang library for malware development
☆309Updated 7 months ago
Related projects: ⓘ
- Real fucking shellcode encryptor & obfuscator tool☆630Updated 4 months ago
- shellcode loader for your evasion needs☆257Updated 3 months ago
- A collection of offensive Go packages inspired by different Go repositories.☆203Updated 3 months ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆291Updated 3 weeks ago
- Evasive shellcode loader, hooks detector and more☆203Updated 9 months ago
- Go shellcode loader that combines multiple evasion techniques☆337Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆532Updated 3 weeks ago
- My collection of malware dev links☆235Updated 2 weeks ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆367Updated last month
- Killer tool is designed to bypass AV/EDR security tools using various evasive techniques.☆709Updated 2 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆240Updated last year
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆302Updated last month
- This repo contains : simple shellcode Loader , Encoders (base64 - custom - UUID - IPv4 - MAC), Encryptors (AES), Fileless Loader (Winhttp…☆397Updated last year
- Command & Control-Framework created for collaboration in python3☆302Updated last year
- 🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific…☆396Updated last month
- Simulate the behavior of AV/EDR for malware development training.☆443Updated 7 months ago
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆452Updated 9 months ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆378Updated 11 months ago
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆485Updated last month
- ☆320Updated last year
- XLL Phishing Tradecraft☆387Updated 2 years ago
- Materials for the workshop "Red Team Ops: Havoc 101"☆325Updated last year
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆608Updated 8 months ago
- it is very good☆502Updated last year
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆405Updated last year
- Protected Process Dumper Tool☆510Updated last year
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆439Updated 3 months ago
- ☆222Updated this week
- ☆303Updated 11 months ago
- ☆653Updated 5 months ago