Malware Development for Ethical Hackers, published by Packt
☆464Jan 29, 2026Updated last month
Alternatives and similar repositories for Malware-Development-for-Ethical-Hackers
Users that are interested in Malware-Development-for-Ethical-Hackers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆73Nov 12, 2025Updated 4 months ago
- ⚠️ malware development☆690May 27, 2024Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆129Mar 15, 2026Updated last week
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,342Mar 4, 2026Updated 3 weeks ago
- ☆45Apr 27, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆12May 31, 2024Updated last year
- Malware Libraries focused in help Malware Development☆25Mar 20, 2023Updated 3 years ago
- Organized list of my malware development resources☆1,703May 16, 2022Updated 3 years ago
- ☆688Mar 20, 2026Updated last week
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆61May 3, 2024Updated last year
- HookChain: A new perspective for Bypassing EDR Solutions☆595Jan 5, 2025Updated last year
- Pure Malware Development Resource Collections☆434Dec 29, 2024Updated last year
- A workshop about Malware Development☆1,772Jun 2, 2023Updated 2 years ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16May 6, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- source code for the examples and topics from the book☆10Mar 11, 2019Updated 7 years ago
- It bridges my research with a functional tool. I want to provide a safe, open-source framework for hackers to test evasion and for defend…☆286Mar 11, 2026Updated 2 weeks ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆765Jan 26, 2025Updated last year
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆164Oct 31, 2024Updated last year
- Slides & Code snippets for a workshop held @ x33fcon 2024☆284Jun 15, 2024Updated last year
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆172Jul 20, 2024Updated last year
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆73Sep 11, 2024Updated last year
- Collection of various malicious functionality to aid in malware development☆1,863Feb 28, 2024Updated 2 years ago
- OFFZONE 2024 Malware Persistence workshop☆22Dec 18, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,059Mar 10, 2026Updated 2 weeks ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- Windows APT Warfare, published by Packt☆75Mar 11, 2023Updated 3 years ago
- Some Rust program I wrote while learning Malware Development☆161Feb 4, 2025Updated last year
- My collection of malware dev links☆312Feb 9, 2026Updated last month
- Awesome EDR Bypass Resources For Ethical Hacking☆1,497Jan 26, 2026Updated 2 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,173Mar 28, 2025Updated 11 months ago
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managem…☆1,452Oct 4, 2024Updated last year
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- OSWE, OSEP, OSED, OSEE☆3,795Jan 2, 2026Updated 2 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,330Nov 12, 2025Updated 4 months ago
- Collect Windows telemetry for Maldev☆465Jan 30, 2026Updated last month
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆54May 12, 2025Updated 10 months ago
- ☆21Jan 8, 2026Updated 2 months ago
- Extract and execute a PE embedded within a PNG file using an LNK file.☆465Nov 2, 2024Updated last year
- Collection of Notes and CheatSheets used for Red teaming Certs☆497Feb 13, 2023Updated 3 years ago