Collection of various malware techniques aimed at Windows through MinGW
☆16Aug 24, 2024Updated last year
Alternatives and similar repositories for Modules
Users that are interested in Modules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WizardsToolkit is a secure C library offering cross-platform cryptography, hashing, authentication, and data integrity tools. It supports…☆16Feb 16, 2026Updated last month
- ☆29Sep 4, 2024Updated last year
- ☆62Jul 9, 2023Updated 2 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- [+] nls_933w.dll + [+] WIN32M.SYS MALWARE- ONLY FOR ACADEMICAL RESEARCH PURPOSES!☆11Sep 20, 2025Updated 6 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Identifies bad bytes from static analysis with any Anti-Virus scanner.☆129Jul 5, 2024Updated last year
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated last year
- XOrCryptEx lightweight C Utility/Algorithm☆13Mar 3, 2022Updated 4 years ago
- ☆81Nov 27, 2023Updated 2 years ago
- ☆29Oct 1, 2025Updated 6 months ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- DUQU MALWARE SOURCE + BINARY + More coming☆14Feb 6, 2023Updated 3 years ago
- Some of my custom "tools".☆28Feb 21, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ICMP隧道,用于内网渗透工具☆10Mar 13, 2019Updated 7 years ago
- HCsCR: Remove your end crystals before the server even knows you hit 'em!☆11Updated this week
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Starcraft 2 Real-time-with-pause☆29Dec 4, 2025Updated 4 months ago
- an iSCSI demo driver for Windows☆12Sep 21, 2015Updated 10 years ago
- A scanner for the FortiNet vulnerability CVE-2025-64446☆30Nov 18, 2025Updated 4 months ago
- Windows Research Kernel☆37Sep 22, 2025Updated 6 months ago
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆14Aug 11, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A C++/Asm template for PIC/EXE/DLL malware☆24Aug 12, 2025Updated 7 months ago
- ☆49Dec 21, 2025Updated 3 months ago
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 4 months ago
- A simple DLL injection protection driver.☆12Dec 21, 2020Updated 5 years ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆61Apr 13, 2025Updated 11 months ago
- SCEP request tool for AD CS and Intune☆75Oct 24, 2025Updated 5 months ago
- fyyre.l2-fashion.de .. old site☆17Apr 27, 2022Updated 3 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆11Aug 6, 2018Updated 7 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 9 months ago
- ☆13Feb 16, 2016Updated 10 years ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆23Jul 11, 2021Updated 4 years ago
- Remote Assistance Volatile Environment LPE☆15Jun 28, 2025Updated 9 months ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- kali linux tutorials and commands for ethical hackers and penetration testing☆10Jul 6, 2025Updated 9 months ago
- Load various payload (DLL from memory, Exe, etc...) in a way to evade static analysis of Antivirus. It can fetch data from various method…☆22Mar 30, 2026Updated last week