RenderZ0n3 / Malware-DevelopmentLinks
☆10Updated 2 years ago
Alternatives and similar repositories for Malware-Development
Users that are interested in Malware-Development are comparing it to the libraries listed below
Sorting:
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- ☆70Updated 2 years ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆34Updated last year
- malleable profile generator GUI for Havoc☆56Updated 2 years ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆96Updated 2 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 10 months ago
- Scripts to interact with Microsoft Graph APIs☆44Updated last year
- Detect userland hooks placed by AV/EDR☆28Updated 2 years ago
- ☆15Updated last year
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆91Updated 5 months ago
- Microsoft Graph API post-exploitation toolkit☆95Updated last year
- ☆52Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- ☆26Updated 10 months ago
- ☆23Updated last year
- Attack chain emulator. Write recipes for initial access easily☆23Updated 10 months ago
- ☆44Updated last year
- ☆47Updated last year
- POC tool to abuse windows server failover clusters☆53Updated 5 months ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆32Updated 10 months ago
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆31Updated 3 years ago
- ☆61Updated 2 years ago
- ☆42Updated 7 months ago
- Linux CS bypass technique☆32Updated 11 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Updated 2 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Updated last year
- Situational Awareness script to identify how and where to run implants☆67Updated last year
- Payload Generation Workflow☆40Updated 6 months ago