MohitDabas / malwinxView external linksLinks
Just a normal flask web app to understand win32api with code snippets and references.
☆75Dec 8, 2019Updated 6 years ago
Alternatives and similar repositories for malwinx
Users that are interested in malwinx are comparing it to the libraries listed below
Sorting:
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 6 years ago
- Telsy CTI Research Team☆57Dec 15, 2020Updated 5 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- ☆14Aug 27, 2025Updated 5 months ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆54May 11, 2021Updated 4 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- executing JS from x86 code☆27May 9, 2019Updated 6 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆178Aug 8, 2024Updated last year
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Mar 8, 2019Updated 6 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 8 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆17Aug 18, 2020Updated 5 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 6 years ago
- A script to track malware IOCs with OSINT on Twitter.☆54May 3, 2024Updated last year
- A DLL that serves OutputDebugString content over a TCP connection☆35Sep 23, 2021Updated 4 years ago
- GO sandbox to run untrusted code☆42Jan 17, 2020Updated 6 years ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆280Dec 13, 2021Updated 4 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Aug 18, 2019Updated 6 years ago
- My articles for Paged Out! #2☆17Nov 20, 2019Updated 6 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆302Apr 24, 2020Updated 5 years ago
- AMIRA: Automated Malware Incident Response & Analysis☆151Feb 3, 2026Updated last week
- create cypher create statements for neo4j out of netstat files from multiple machines☆41Dec 28, 2020Updated 5 years ago
- An AI-powered security analysis tool for web applications that combines Large Language Model (LLM) analysis with intelligent agent-based …☆46Jul 26, 2025Updated 6 months ago
- Injects C# EXE or DLL Assembly into every CLR runtime and AppDomain of another process.☆236Jan 15, 2019Updated 7 years ago
- It's a tool to manage vulnerables packages in your *nix server, in a centralized way☆30Dec 15, 2020Updated 5 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Sep 13, 2021Updated 4 years ago
- Automate Metasploit scanning and exploitation☆117Jul 20, 2025Updated 6 months ago
- ☆334Dec 8, 2022Updated 3 years ago
- an asynchronous target enumeration tool☆245Dec 8, 2022Updated 3 years ago
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- A stealthy C++ shellcode loader using anti-analysis checks, AES-256 decryption, and dynamic memory permissions to evade detection. Includ…☆21Apr 2, 2025Updated 10 months ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago