EvaStanAccount / MalwareDevLinks
☆16Updated 3 years ago
Alternatives and similar repositories for MalwareDev
Users that are interested in MalwareDev are comparing it to the libraries listed below
Sorting:
- ☆39Updated 4 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- ☆29Updated 4 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆27Updated 3 years ago
- C# Based Universal API Unhooker - Automatically Unhook API Hives (ntdll.dll,kernel32.dll,user32.dll,and kernelbase.dll)☆23Updated 2 years ago
- A C port of b33f's UrbanBishop☆38Updated 4 years ago
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆18Updated 2 years ago
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Updated 2 years ago
- Execute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx☆15Updated 4 years ago
- ☆26Updated 4 months ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 2 years ago
- API Hammering with C++20☆46Updated 2 years ago
- A C# port of the MinHook API hooking library☆55Updated 2 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆38Updated 3 years ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated last year
- ☆82Updated 9 months ago
- Attack chain emulator. Write recipes for initial access easily☆20Updated 3 months ago
- ☆48Updated 4 years ago
- idk man this was the default github name☆35Updated 2 years ago
- SharpASM is a C# project that aims to automate ASM (i.e. shellcode) execution in .NET programs by exploiting code caves in RWX sections a…☆57Updated 3 years ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆14Updated last year
- A simple PE loader.☆26Updated 2 years ago
- A simple example on how to initiate a direct syscall on WoW64☆11Updated 7 years ago
- A simple Linux in-memory .so loader☆30Updated 2 years ago
- A .NET binary loader that bypasses AMSI☆46Updated 3 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 11 months ago