☆16Sep 23, 2021Updated 4 years ago
Alternatives and similar repositories for MalwareDev
Users that are interested in MalwareDev are comparing it to the libraries listed below
Sorting:
- Learning Process Injection and Hollowing techniques☆42Jun 26, 2022Updated 3 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- ☆11Aug 7, 2021Updated 4 years ago
- Load a fresh new copy of ntdll.dll via file mapping to bypass API inline hook.☆62Sep 6, 2021Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- ProcessHollowing via csharp☆13Dec 21, 2021Updated 4 years ago
- Malware development for red teaming workshop☆225Nov 15, 2021Updated 4 years ago
- ☆18Aug 19, 2021Updated 4 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Aug 11, 2023Updated 2 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Small POC written in C# that performs shellcode injection on x64 processes using direct syscalls as a way to bypass user-land EDR hooks.☆85Dec 20, 2019Updated 6 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.☆18Jan 21, 2022Updated 4 years ago
- Malware Development☆10Sep 30, 2020Updated 5 years ago
- Extracting Syscall Stub, Modernized☆65Apr 2, 2022Updated 3 years ago
- Reflective DLL Injection with obfuscated (XOR) shellcode☆73Dec 13, 2020Updated 5 years ago
- ☆14Oct 31, 2016Updated 9 years ago
- Collection of Jupyter notebooks☆14Mar 11, 2021Updated 5 years ago
- Decoder for VMProtect hwids☆18Aug 1, 2022Updated 3 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Jul 24, 2022Updated 3 years ago
- ☆42Apr 22, 2021Updated 4 years ago
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆28Jun 2, 2024Updated last year
- Packer compressing .net assemblies, (ab)using the PE format for data storage☆177Jan 14, 2023Updated 3 years ago
- ☆19Mar 21, 2020Updated 5 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- A set of scripts that demonstrate how to perform memory injection in C#☆321Nov 5, 2017Updated 8 years ago
- Shellcode Loader with Indirect Dynamic syscall Implementation , shellcode in MAC format, API resolving from PEB, Syscall calll and syscal…☆322Aug 2, 2023Updated 2 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- Process inject technique "Thread hijacking" via csharp☆15Dec 18, 2021Updated 4 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- A C++/Asm template for PIC/EXE/DLL malware☆24Aug 12, 2025Updated 7 months ago
- Userland API Unhooker Project☆111Jun 14, 2021Updated 4 years ago
- ☆51Sep 18, 2020Updated 5 years ago
- Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.☆22Jul 11, 2022Updated 3 years ago