FarghlyMal / leaked_srcView external linksLinks
some leaked src code for known and unknown malwares
☆23Aug 15, 2025Updated 5 months ago
Alternatives and similar repositories for leaked_src
Users that are interested in leaked_src are comparing it to the libraries listed below
Sorting:
- Troll TaskManager, and play with it .☆30Aug 3, 2025Updated 6 months ago
- ☆26May 6, 2024Updated last year
- ☆59Oct 24, 2024Updated last year
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Jul 24, 2022Updated 3 years ago
- Panoptes Endpoint Detection and Response Solution☆42Jan 19, 2026Updated 3 weeks ago
- ☆38Apr 15, 2025Updated 9 months ago
- 自用的shellcode生成框架☆33Jul 5, 2023Updated 2 years ago
- Installing wazuh SIEM Unified XDR and SIEM protection☆31Jun 3, 2025Updated 8 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆99Feb 18, 2025Updated 11 months ago
- ☆41Feb 20, 2025Updated 11 months ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆99Jul 9, 2025Updated 7 months ago
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆68Dec 17, 2025Updated last month
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆73Nov 6, 2025Updated 3 months ago
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- Python 3 script to dump/scrape/extract company employees from XING API☆39Updated this week
- A Rust crate for parsing Windows user minidumps.☆41May 1, 2024Updated last year
- Mitre ATT&CK and Suricata Rules Automation with AI & LLM☆14Sep 28, 2024Updated last year
- A web application dedicated to write sysmon configuration file☆13Oct 23, 2025Updated 3 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Apr 27, 2025Updated 9 months ago
- Red Team Collaboration Infrastructure☆98Apr 24, 2025Updated 9 months ago
- Group Policy Objects manipulation and exploitation framework☆289Dec 7, 2025Updated 2 months ago
- ☆37Apr 1, 2024Updated last year
- A collection of FreeBSD rootkit kernel modules and utilities☆13Jun 25, 2025Updated 7 months ago
- A controlled environment for demonstrating and understanding buffer overflow vulnerabilities in web applications. This project is designe…☆24Jan 27, 2025Updated last year
- This repository contains a collection of scripts I use regularly for offensive security-related tasks.☆15Jan 17, 2026Updated 3 weeks ago
- WinDbg plugin to trace module transitions from a debugged driver.☆40Dec 22, 2025Updated last month
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Dec 12, 2023Updated 2 years ago
- A tool that expands the size of the text section in a PE file without loss, supporting both 32-bit and 64-bit programs.☆41May 9, 2024Updated last year
- ☆50Feb 21, 2025Updated 11 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Mar 6, 2025Updated 11 months ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- A list of OSINT resources and tools that may be useful when conducting investigations related to the Kingdom of Saudi Arabia☆12May 12, 2025Updated 9 months ago
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆26Jul 11, 2025Updated 7 months ago
- Multilayered secret detection tool☆41Feb 5, 2026Updated last week
- Singer.io tap for extracting data from the Slack Web API☆11Dec 18, 2025Updated last month
- ☆12Jan 14, 2025Updated last year