PacktPublishing / Malware-Development-for-Ethical-Hackers
Malware Development for Ethical Hackers, published by Packt
☆315Updated 5 months ago
Alternatives and similar repositories for Malware-Development-for-Ethical-Hackers:
Users that are interested in Malware-Development-for-Ethical-Hackers are comparing it to the libraries listed below
- Pure Malware Development Resource Collections☆278Updated 4 months ago
- ⚠️ malware development☆541Updated 11 months ago
- ☆474Updated 2 weeks ago
- Certified Red Team Operator☆410Updated 3 years ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆374Updated 5 months ago
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆646Updated 2 weeks ago
- Collection of Notes and CheatSheets used for Red teaming Certs☆310Updated 2 years ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆177Updated last month
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆658Updated last year
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆703Updated 3 months ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆298Updated last week
- This is for Ethical Use only.☆359Updated last week
- My collection of malware dev links☆265Updated 8 months ago
- Study materials for the Certified Red Team Pentesting (CRTP) exam, covering essential concepts in red teaming and penetration testing☆346Updated last year
- Cybersecurity research results. Simple C/C++ and Python implementations☆222Updated last week
- ☆22Updated last year
- ☆351Updated last year
- An List of my Powershell scripts, commands and Blogs for windows Red Teaming.☆423Updated 2 months ago
- Embed a payload inside a PNG file☆312Updated 6 months ago
- EDR & Antivirus Bypass to Gain Shell Access☆237Updated 7 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆160Updated 2 months ago
- Windows Local Privilege Escalation Cookbook☆1,103Updated 3 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆381Updated 7 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆746Updated last month
- PEN-300 collection to help you on your exam.☆561Updated last year
- Projects for security students and professionals☆181Updated 10 months ago
- AV/EDR Evasion Lab for Training & Learning Purposes☆1,242Updated this week
- Koth - TryHackMe Tricks☆167Updated last year
- sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment☆729Updated 2 weeks ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆565Updated 6 months ago