Malwareman007 / x64-DSA-AssemblyLinks
An x64 assembly implementation of essential data structures and algorithms for DSA.
☆14Updated 2 years ago
Alternatives and similar repositories for x64-DSA-Assembly
Users that are interested in x64-DSA-Assembly are comparing it to the libraries listed below
Sorting:
- Movie Recommendation System based on machine learning concepts☆10Updated last year
- Personal notes☆10Updated 2 years ago
- My attempt to teach others about microprocessors and programming in IA-32 and IA-64 assembly, and to spread the word of how awesome it is…☆29Updated 2 years ago
- ☆19Updated last year
- Some basic info, resources, and code snippets about windows kernel exploitation☆14Updated 2 years ago
- 「🚪」The hidden hookless backdoor☆12Updated 6 months ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆18Updated 2 years ago
- Simple Ransoware to attack Windows 🌟☆20Updated 2 years ago
- MalDev & AV-EDR Evasion for Pentesters☆15Updated 2 years ago
- 「💻」Simple kernel made in 16-bit assembly only☆16Updated 6 months ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆32Updated last year
- ☆10Updated 2 months ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated last year
- Lucifer is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python.☆19Updated 2 years ago
- An offensive security framework for writing payloads☆17Updated 2 years ago
- Files related to my training classes☆16Updated 4 years ago
- This is Command and Control (C2) Framework (cli / c2-server / implant)☆17Updated 9 months ago
- A utility that can be used to launch an executable with a DLL injected☆20Updated last year
- Brute force a REST API query through WebSocket. Based on cURL.☆9Updated 2 years ago
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆20Updated 2 years ago
- 🐍 Python Exploit for CVE-2022-23935☆13Updated 2 years ago
- A cyber security oriented interpreted programming language designed to make your experience with cyber security (offensive and defensive)…☆17Updated last year
- Trojan written in C++ for Windows☆18Updated last year
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- ☆16Updated 2 years ago
- POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.☆17Updated 4 months ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago