Repo for malware development practices I post on my blog
☆36Oct 5, 2024Updated last year
Alternatives and similar repositories for malware-practices
Users that are interested in malware-practices are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Shellcode loader with evasion capabilities written in Nim☆16Jan 25, 2025Updated last year
- Cookie & Logins stealer for Firefox + Chrome, demonstration only☆12Apr 5, 2023Updated 3 years ago
- Golang library for malware development☆391Nov 20, 2024Updated last year
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆29Mar 16, 2024Updated 2 years ago
- string encryption in Nim☆19Jun 15, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆25Jun 19, 2022Updated 3 years ago
- A cheatsheet and mindmap for CRTO certification☆16Mar 22, 2023Updated 3 years ago
- Windows process injection methods☆19Jul 18, 2021Updated 4 years ago
- Proof of Concept Exploit for ManageEngine ServiceDesk Plus CVE-2021-44077☆35Dec 8, 2021Updated 4 years ago
- impersonate trustedinstaller by fiddling with tokens☆14Aug 30, 2021Updated 4 years ago
- Thanks to @d35ha☆13Aug 16, 2021Updated 4 years ago
- a simple backdoor in Nim☆18Aug 6, 2021Updated 4 years ago
- Shellcode loader generator with multiples features☆513Dec 31, 2024Updated last year
- Callback Function Loader Implemented in Go☆138Mar 26, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A golang library designed to interact with Metasploit☆43Mar 27, 2021Updated 5 years ago
- Allow a Go process to dynamically load .NET assemblies☆148Mar 28, 2020Updated 6 years ago
- ☆37Apr 29, 2023Updated 3 years ago
- PoC dlls for Task Scheduler COM Hijacking☆92Jul 20, 2016Updated 9 years ago
- PoC of injecting code into a running Linux process☆22Sep 11, 2019Updated 6 years ago
- iOS traffic interception framework which route all device HTTP/HTTPS traffic through Burp Suite via a system-wide VPN tunnel☆43Feb 15, 2026Updated 3 months ago
- 记录一下我学习的Win32CPP☆56Aug 5, 2025Updated 9 months ago
- Dump Linux keyrings☆24Jul 15, 2024Updated last year
- gh0str3con is a All in one cloud based web Recon tool.☆24Jul 8, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆15May 25, 2025Updated 11 months ago
- Golang implementation of the research by @jonaslyk and the drafted PoC from @LloydLabs☆27Dec 3, 2021Updated 4 years ago
- Preventing 3rd Party DLLs from Injecting into your Malware☆25Aug 31, 2021Updated 4 years ago
- RawCopy - Golang implementation☆24Oct 27, 2022Updated 3 years ago
- Change hash for a signed pe☆18Jul 18, 2023Updated 2 years ago
- crawler for finding reflected parameters and reflecting special characters!☆21Dec 2, 2024Updated last year
- ☆111Apr 23, 2026Updated 3 weeks ago
- 代码静态检测,内存泄露检测,性能分析,段错误处理的例子☆13Sep 8, 2023Updated 2 years ago
- improved shellcode template for b1tg/rust-windows-shellcode☆29May 12, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Golang implementation of Reflective load PE from memory☆63Jan 10, 2022Updated 4 years ago
- Escaner WEB que tiene como objetivo sacar toda la información posible como IP, CMS, Usuarios, posibles correos, rendimiento de la URL, Pu…☆29Sep 3, 2022Updated 3 years ago
- Proof of concept SMB C2 using named pipes in Golang☆26Sep 8, 2019Updated 6 years ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- kill windows log☆45Mar 26, 2024Updated 2 years ago
- use aswArPot.sys to kill process☆69Aug 26, 2022Updated 3 years ago
- A Trading bot designed to trade top gaining or top losing assets based on CoinGecko API. Uses python and the Binance API to place orders.☆15Jan 20, 2025Updated last year