PacktPublishing / Malware-Development-for-Ethical-Hackers
Malware Development for Ethical Hackers, published by Packt
☆276Updated 2 months ago
Alternatives and similar repositories for Malware-Development-for-Ethical-Hackers:
Users that are interested in Malware-Development-for-Ethical-Hackers are comparing it to the libraries listed below
- ⚠️ malware development☆500Updated 8 months ago
- Pure Malware Development Resource Collections☆217Updated last month
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆477Updated last week
- ☆393Updated last week
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆356Updated 2 months ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆649Updated last year
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆675Updated 3 weeks ago
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆610Updated 5 months ago
- Certified Red Team Operator☆344Updated 2 years ago
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning …☆267Updated last year
- EDR & Antivirus Bypass to Gain Shell Access☆231Updated 4 months ago
- Cybersecurity research results. Simple C/C++ and Python implementations☆203Updated last week
- ☆338Updated last year
- My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.☆100Updated this week
- Study materials for the Certified Red Team Pentesting (CRTP) exam, covering essential concepts in red teaming and penetration testing☆326Updated last year
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆653Updated 9 months ago
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆196Updated 3 months ago
- Projects for security students and professionals☆164Updated 7 months ago
- My collection of malware dev links☆253Updated 5 months ago
- Embed a payload inside a PNG file☆289Updated 3 months ago
- Collection of Notes and CheatSheets used for Red teaming Certs☆209Updated 2 years ago
- AV/EDR Lab environment setup references to help in Malware development☆363Updated 2 months ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆549Updated 3 months ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆130Updated last year
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆276Updated this week
- sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment☆531Updated last week
- An List of my own Powershell scripts, commands and Blogs for windows Red Teaming.☆389Updated 3 months ago
- This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.☆205Updated 3 weeks ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆169Updated 11 months ago
- Extract and execute a PE embedded within a PNG file using an LNK file.☆355Updated 3 months ago